Multi-Step Attack Pattern Detection on Normalized Event Logs

被引:13
|
作者
Jaeger, David [1 ]
Ussath, Martin [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Hasso Plattner Inst, Potsdam, Germany
关键词
pattern detection; attack signature; multi-step attack; event logs; normalization; threat intelligence; MODEL;
D O I
10.1109/CSCloud.2015.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many of these attacks are performed in multiple steps to reach the core of the targeted network. Existing signature detection solutions are focused on the detection of a single step of an attack, but they do not see the big picture. Furthermore, current signature languages cannot integrate valuable external threat intelligence, which would simplify the creation of complex signatures and enables the detection of malicious activities seen by other targets. We extend an existing multi-step signature language to support attack detection on normalized log events, which were collected from various applications and devices. Additionally, the extended language supports the integration of external threat intelligence and allows us to reference current threat indicators. With this approach, we can create generic signatures that stay up-to-date. Using our language, we could detect various login brute-force attempts on multiple applications with only one generic signature.
引用
收藏
页码:390 / 398
页数:9
相关论文
共 50 条
  • [1] A systematic survey on multi-step attack detection
    Navarro, Julio
    Deruyver, Aline
    Parrend, Pierre
    COMPUTERS & SECURITY, 2018, 76 : 214 - 249
  • [2] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    Liu, Zhijie
    Wang, Chongjun
    Chen, Shifu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
  • [3] Detection algorithm for multi-step attack based on CTPN
    Yan, Fen
    Huang, Hao
    Yin, Xin-Chun
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
  • [4] A wireless multi-step attack pattern recognition method for WLAN
    Chen, Guanlin
    Zhang, Yujia
    Wang, Can
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (16) : 7068 - 7076
  • [5] MAD: A Middleware Framework for Multi-Step Attack Detection
    Papadopoulos, Panagiotis
    Petsas, Thanasis
    Christou, Giorgos
    Vasiliadis, Giorgos
    2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 8 - 15
  • [6] Multi-layer episode filtering for the multi-step attack detection
    Soleimani, Mahbobeh
    Ghorbani, Ali A.
    COMPUTER COMMUNICATIONS, 2012, 35 (11) : 1368 - 1379
  • [7] A Multi-Step Attack Pattern Discovery Method Based on Graph Mining
    Xu Jinghu
    Li Aiping
    Zhao Hui
    Yin Hong
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 376 - 380
  • [8] Multi-step attack detection method based on network communication anomaly recognition
    Ju A.
    Guo Y.
    Li T.
    Ye Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (07): : 57 - 66
  • [9] LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks
    Yang, Huiran
    Kang, Jiaqi
    Dai, Yueyue
    Sun, Jiyan
    Zhang, Yan
    Cui, Huajun
    Ma, Can
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 676 - 685
  • [10] Multi-step attack detection in industrial control systems using causal analysis
    Jadidi, Zahra
    Hagemann, Joshua
    Quevedo, Daniel
    COMPUTERS IN INDUSTRY, 2022, 142