Multi-Step Attack Pattern Detection on Normalized Event Logs

被引:13
|
作者
Jaeger, David [1 ]
Ussath, Martin [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Hasso Plattner Inst, Potsdam, Germany
关键词
pattern detection; attack signature; multi-step attack; event logs; normalization; threat intelligence; MODEL;
D O I
10.1109/CSCloud.2015.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many of these attacks are performed in multiple steps to reach the core of the targeted network. Existing signature detection solutions are focused on the detection of a single step of an attack, but they do not see the big picture. Furthermore, current signature languages cannot integrate valuable external threat intelligence, which would simplify the creation of complex signatures and enables the detection of malicious activities seen by other targets. We extend an existing multi-step signature language to support attack detection on normalized log events, which were collected from various applications and devices. Additionally, the extended language supports the integration of external threat intelligence and allows us to reference current threat indicators. With this approach, we can create generic signatures that stay up-to-date. Using our language, we could detect various login brute-force attempts on multiple applications with only one generic signature.
引用
收藏
页码:390 / 398
页数:9
相关论文
共 50 条
  • [31] Introducing a New Alert Data Set for Multi-Step Attack Analysis
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 32 - 44
  • [32] A multi-step attack identification and correlation method based on multi-information fusion
    Liao, Niandong
    Wang, Jiaxun
    Guan, Jiayu
    Fan, Hejun
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [33] A Method of Maneuver Detection Based on Multi-step Innovation
    Wang Yong
    9TH INTERNATIONAL CONFERENCE ON MECHATRONICS AND MANUFACTURING (ICMM 2018), 2018, 361
  • [34] Retraction Note: A multi-step APT attack detection using hidden Markov models by molecular magnetic sensors
    U. Sakthivelu
    C. N. S. Vinoth Kumar
    Optical and Quantum Electronics, 56 (12)
  • [35] MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
    Mao, Beifeng
    Liu, Jing
    Lai, Yingxu
    Sun, Motong
    COMPUTER NETWORKS, 2021, 198
  • [36] Change pattern relationships in event logs
    Cremerius, Jonas
    Patzlaff, Hendrik
    Weske, Mathias
    DATA & KNOWLEDGE ENGINEERING, 2024, 154
  • [37] Hormone-refractory prostate cancer: a multi-step and multi-event process
    A de la Taille
    F Vacherot
    L Salomon
    C Druel
    S Gil Diez de Medina
    C Abbou
    R Buttyan
    D Chopin
    Prostate Cancer and Prostatic Diseases, 2001, 4 : 204 - 212
  • [38] Hormone-refractory prostate cancer: a multi-step and multi-event process
    de la Taille, A
    Vacherot, F
    Salomon, L
    Druel, C
    de Medina, SGD
    Abbou, C
    Buttyan, R
    Chopin, D
    PROSTATE CANCER AND PROSTATIC DISEASES, 2001, 4 (04) : 204 - 212
  • [39] A defense-centric model for multi-step attack damage cost evaluation
    Shameli-Sendi, Alireza
    Louafi, Habib
    He, Wenbo
    Cheriet, Mohamed
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 145 - 149
  • [40] Approach to forecasting multi-step attack based on fuzzy hidden markov model
    Zhao, D., 1600, Asian Network for Scientific Information (13):