Semi-supervised based Unknown Attack Detection in EDR Environment

被引:6
作者
Hwang, Chanwoong [1 ]
Kim, Doyeon [1 ]
Lee, Taejin [1 ]
机构
[1] Hoseo Univ, Dept Informat Secur, Asan, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 12期
基金
新加坡国家研究基金会;
关键词
Endpoint Security; EDR; Unknown Attack Detection; AutoEncoder; 1D CNN; ANOMALY DETECTION;
D O I
10.3837/tiis.2020.12.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.
引用
收藏
页码:4909 / 4926
页数:18
相关论文
共 22 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]  
Ahmed M, 2014, C IND ELECT APPL, P1141, DOI 10.1109/ICIEA.2014.6931337
[3]  
Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
[4]  
Andrade T., 2019, ANOMALY DETECTION SE
[5]  
[Anonymous], 2015, ESANN
[6]   Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks [J].
Bontemps, Loic ;
Van Loi Cao ;
McDermott, James ;
Nhien-An Le-Khac .
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 :141-152
[7]  
Cisco, Cisco Annual Internet Report (2018-2023) White Paper
[8]   A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks [J].
Garg, Sahil ;
Kaur, Kuljeet ;
Kumar, Neeraj ;
Kaddoum, Georges ;
Zomaya, Albert Y. ;
Ranjan, Rajiv .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :924-935
[9]  
Gong FL, 2017, 2017 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES, ARTS AND HUMANITIES (SSAH 2017), P90
[10]   anomalyDetection: Implementation of Augmented Network Log Anomaly Detection Procedures [J].
Gutierrez, Robert J. ;
Boehmke, Bradley C. ;
Bauer, Kenneth W. ;
Saie, Cade M. ;
Bihl, Trevor J. .
R JOURNAL, 2017, 9 (02) :354-365