APTrace: A Responsive System for Agile Enterprise Level Causality Analysis

被引:6
作者
Gui, Jiaping [1 ]
Li, Ding [1 ]
Chen, Zhengzhang [1 ]
Rhee, Junghwan [1 ]
Xiao, Xusheng [2 ]
Zhang, Mu [3 ]
Jee, Kangkook [4 ]
Li, Zhichun [5 ]
Chen, Haifeng [1 ]
机构
[1] NEC Labs Amer Inc, Princeton, NJ 08540 USA
[2] Case Western Reserve Univ, Cleveland, OH 44106 USA
[3] Univ Utah, Salt Lake City, UT 84112 USA
[4] Univ Texas Dallas, Richardson, TX 75083 USA
[5] Stellar Cyber, Santa Clara, CA USA
来源
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020) | 2020年
关键词
Backtracking analysis; domain language; expressiveness; responsiveness;
D O I
10.1109/ICDE48307.2020.00151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While backtracking analysis has been successful in assisting the investigation of complex security attacks, it faces a critical dependency explosion problem. To address this problem, security analysts currently need to tune backtracking analysis manually with different case-specific heuristics. However, existing systems fail to fulfill two important system requirements to achieve effective backtracking analysis. First, there need flexible abstractions to express various types of heuristics. Second, the system needs to be responsive in providing updates so that the progress of backtracking analysis can be frequently inspected, which typically involves multiple rounds of manual tuning. In this paper, we propose a novel system, APTrace, to meet both of the above requirements. As we demonstrate in the evaluation, security analysts can effectively express heuristics to reduce more than 99.5% of irrelevant events in the backtracking analysis of real-world attack cases. To improve the responsiveness of backtracking analysis, we present a novel execution-window partitioning algorithm that significantly reduces the waiting time between two consecutive updates (especially, 57 times reduction for the top 1% waiting time).
引用
收藏
页码:1701 / 1712
页数:12
相关论文
共 37 条
[1]  
[Anonymous], 2015, P 31 ANN COMP SEC AP
[2]  
[Anonymous], 2013, NETWORK DISTRIBUTED
[3]  
[Anonymous], 2014, CVE20146271
[4]  
[Anonymous], 2011, P 2011 ACM SIGMOD IN
[5]  
[Anonymous], 2019, NDSS
[6]  
[Anonymous], 2005, P NETW DISTR SYST SE
[7]  
[Anonymous], P 19 ACM S OP SYST P
[8]   ILAB: An Interactive Labelling Strategy for Intrusion Detection [J].
Beaugnon, Anael ;
Chifflier, Pierre ;
Bach, Francis .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 :120-140
[9]  
Bovet D., 2005, Understanding the Linux Kernel: from I/O ports to process management
[10]   Scalable Progressive Analytics on Big Data in the Cloud [J].
Chandramouli, Badrish ;
Goldstein, Jonathan ;
Quamar, Abdul .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (14) :1726-1737