Detection of malicious activities in corporate environments is a very complex task and much effort has been invested into research of its automation. However, vast majority of existing methods operate only in a narrow scope which limits them to capture only fragments of the evidence of malware's presence. Consequently, such approach is not aligned with the way how the cyber threats are studied and described by domain experts. In this work, we discuss these limitations and design a detection framework which combines observed events from different sources of data. Thanks to this, it provides full insight into the attack life cycle and enables detection of threats that require this coupling of observations from different telemetries to identify the full scope of the incident. We demonstrate applicability of the framework on a case study of a real malware infection observed in a corporate network.
翻译:发现公司环境中的恶意活动是一项非常复杂的任务,已投入大量精力研究其自动化工作,但是,绝大多数现有方法的操作范围狭窄,限制了它们只捕捉恶意软件存在证据碎片的范围,因此,这种方法与域专家如何研究和描述网络威胁的方式不相一致。在这项工作中,我们讨论这些局限性,设计一个探测框架,将不同数据来源的观测事件结合起来。因此,它能够充分洞察攻击生命周期,并能够发现各种威胁,这些威胁需要将不同远程配置的观测结果结合起来,以确定事件的全部范围。我们证明该框架适用于公司网络观察到的真正恶意软件感染的案例研究。