With the development of information technology, the border of the cyberspace gets much broader, exposing more and more vulnerabilities to attackers. Traditional mitigation-based defence strategies are challenging to cope with the current complicated situation. Security practitioners urgently need better tools to describe and modelling attacks for defence. The provenance graph seems like an ideal method for threat modelling with powerful semantic expression ability and attacks historic correlation ability. In this paper, we firstly introduce the basic concepts about system-level provenance graph and proposed typical system architecture for provenance graph-based threat detection and investigation. A comprehensive provenance graph-based threat detection system can be divided into three modules, namely, "data collection module", "data management module", and "threat detection modules". Each module contains several components and involves many research problem. We systematically analyzed the algorithms and design details involved. By comparison, we give the strategy of technology selection. Moreover, we pointed out the shortcomings of the existing work for future improvement.
翻译:随着信息技术的发展,网络空间的边界变得更加广泛,使攻击者更容易受到攻击。传统的减灾防御战略在应对当前复杂局势方面具有挑战性。安全从业人员迫切需要更好的工具来描述和模拟防御攻击。出处图似乎是威胁建模的理想方法,具有很强的语义表达能力和历史相关能力。在本文件中,我们首先介绍了系统一级出处图的基本概念,以及基于来源图表的威胁探测和调查的拟议典型系统架构。全面的出处图威胁探测系统可以分为三个模块,即“数据收集模块”、“数据管理模块”和“威胁探测模块”。每个模块包含若干组成部分,涉及许多研究问题。我们系统地分析了所涉及的算法和设计细节。相比之下,我们给出了技术选择战略。此外,我们指出了当前改进工作的缺点。