Multi-Step Attack Pattern Detection on Normalized Event Logs

被引:13
|
作者
Jaeger, David [1 ]
Ussath, Martin [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Hasso Plattner Inst, Potsdam, Germany
关键词
pattern detection; attack signature; multi-step attack; event logs; normalization; threat intelligence; MODEL;
D O I
10.1109/CSCloud.2015.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many of these attacks are performed in multiple steps to reach the core of the targeted network. Existing signature detection solutions are focused on the detection of a single step of an attack, but they do not see the big picture. Furthermore, current signature languages cannot integrate valuable external threat intelligence, which would simplify the creation of complex signatures and enables the detection of malicious activities seen by other targets. We extend an existing multi-step signature language to support attack detection on normalized log events, which were collected from various applications and devices. Additionally, the extended language supports the integration of external threat intelligence and allows us to reference current threat indicators. With this approach, we can create generic signatures that stay up-to-date. Using our language, we could detect various login brute-force attempts on multiple applications with only one generic signature.
引用
收藏
页码:390 / 398
页数:9
相关论文
共 50 条
  • [21] A multi-step APT attack detection using hidden Markov models by molecular magnetic sensors
    Sakthivelu, U.
    Kumar, C. N. S. Vinoth
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (03)
  • [22] RShield: A Refined Shield for Complex Multi-step Attack Detection Based on Temporal Graph Network
    Yang, Weiyong
    Gao, Peng
    Huang, Hao
    Wei, Xingshen
    Liu, Wei
    Zhu, Shishun
    Luo, Wang
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT III, 2022, : 468 - 480
  • [23] Cascading Failure Model Considering Multi-Step Attack Strategy
    Guo, Hengdao
    Iu, Herbert Ho-Ching
    Fernando, Tyrone
    Zheng, Ciyan
    Zhang, Xi
    Tse, Chi K.
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [24] A Privacy-Preserving Multi-step Attack Correlation Algorithm
    Xian, Minyi
    Zhang, Yongtang
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
  • [25] Corrosion detection by multi-step genetic algorithm
    Amaya, K.
    Ridha, M.
    Aoki, S.
    SIMULATION OF ELECTROCHEMICAL PROCESSES II, 2007, 54 : 299 - +
  • [26] Privacy-preserving sequential step mining algorithm for multi-step attack correlation
    Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    Qinghua Daxue Xuebao, 10 (1427-1434):
  • [27] Security risk assessment based on bayesian multi-step attack graphs
    Yang, Yunxue
    Jin, Shuyuan
    Fang, Binxing
    Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
  • [28] A multi-step key recovery attack on reduced round Salsa and ChaCha
    Garai, Hirendra Kumar
    Dey, Sabyasachi
    CRYPTOLOGIA, 2024,
  • [29] An Unsupervised Two-Layer Multi-Step Network Attack Detector
    Wang, Su
    Wang, Zhiliang
    Yin, Xia
    Shi, Xingang
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1308 - 1309
  • [30] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
    Wang, Xiaoyu
    Gong, Xiaorui
    Yu, Lei
    Liu, Jian
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 726 - 733