Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities based on network scans and expert knowledge. In real-world operations however, it is costly and ineffective to rely on constant vulnerability scanning and expert-crafted AGs. We propose to automatically learn AGs based on actions observed through intrusion alerts, without prior expert knowledge. Specifically, we develop an unsupervised sequence learning system, SAGE, that leverages the temporal and probabilistic dependence between alerts in a suffix-based probabilistic deterministic finite automaton (S-PDFA) -- a model that accentuates infrequent severe alerts and summarizes paths leading to them. AGs are then derived from the S-PDFA on a per-objective, per-victim basis. Tested with intrusion alerts collected through Collegiate Penetration Testing Competition, SAGE compresses over 330k alerts into 93 AGs. These AGs reflect the strategies used by the participating teams. The AGs are succinct, interpretable, and capture behavioral dynamics, e.g., that attackers will often follow shorter paths to re-exploit objectives.
翻译:攻击图( AG) 用于评估网络对手渗透网络的途径。 AG 最先进的生成方法主要侧重于基于网络扫描和专家知识的系统脆弱性之间产生依赖性。 然而,在现实世界的运作中,依赖持续的脆弱性扫描和专家设计的AG是昂贵和无效的。 我们提议根据入侵警报所观察到的行动自动学习AG,而没有事先的专家知识。 具体地说,我们开发了一个不受监督的序列学习系统SAGE, 该系统利用在以麻ix为基础的确定性定律性定律自动图(S-PDFA)中警报之间的时间和概率依赖性。 这种模型强化了不常见的严重警报并概述了通往这些警报的路径。 然后,AGS-PDFA根据每个目标、每个受害者的情况从S-PDFA中衍生出。 测试通过Colegiate穿透测试所收集的入侵警报,SAGEGE 330以上的压缩器对93 AGs进行测试。 这些AGs反映参加小组使用的战略。 AGs常常是简明、可解释、可捕捉取的目标。