APTrace: A Responsive System for Agile Enterprise Level Causality Analysis

被引:6
作者
Gui, Jiaping [1 ]
Li, Ding [1 ]
Chen, Zhengzhang [1 ]
Rhee, Junghwan [1 ]
Xiao, Xusheng [2 ]
Zhang, Mu [3 ]
Jee, Kangkook [4 ]
Li, Zhichun [5 ]
Chen, Haifeng [1 ]
机构
[1] NEC Labs Amer Inc, Princeton, NJ 08540 USA
[2] Case Western Reserve Univ, Cleveland, OH 44106 USA
[3] Univ Utah, Salt Lake City, UT 84112 USA
[4] Univ Texas Dallas, Richardson, TX 75083 USA
[5] Stellar Cyber, Santa Clara, CA USA
来源
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020) | 2020年
关键词
Backtracking analysis; domain language; expressiveness; responsiveness;
D O I
10.1109/ICDE48307.2020.00151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While backtracking analysis has been successful in assisting the investigation of complex security attacks, it faces a critical dependency explosion problem. To address this problem, security analysts currently need to tune backtracking analysis manually with different case-specific heuristics. However, existing systems fail to fulfill two important system requirements to achieve effective backtracking analysis. First, there need flexible abstractions to express various types of heuristics. Second, the system needs to be responsive in providing updates so that the progress of backtracking analysis can be frequently inspected, which typically involves multiple rounds of manual tuning. In this paper, we propose a novel system, APTrace, to meet both of the above requirements. As we demonstrate in the evaluation, security analysts can effectively express heuristics to reduce more than 99.5% of irrelevant events in the backtracking analysis of real-world attack cases. To improve the responsiveness of backtracking analysis, we present a novel execution-window partitioning algorithm that significantly reduces the waiting time between two consecutive updates (especially, 57 times reduction for the top 1% waiting time).
引用
收藏
页码:1701 / 1712
页数:12
相关论文
共 37 条
[31]   Detecting intrusions using system calls: Alternative data models [J].
Warrender, C ;
Forrest, S ;
Pearlmutter, B .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :133-145
[32]  
Wuchner T., 2014, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '14, P271
[33]  
Xu Z., 2016, CCS, P504
[34]  
Yin H, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P116
[35]  
You I., 2010, 2010 INT C BROADBAND, P297, DOI DOI 10.1109/BWCCA.2010.85
[36]   Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs [J].
Zhang, Mu ;
Duan, Yue ;
Yin, Heng ;
Zhao, Zhiruo .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1105-1116
[37]  
Zhong C, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P263, DOI 10.1109/ISI.2013.6578832