Today, human security analysts collapse under the sheer volume of alerts they have to triage during investigations. The inability to cope with this load, coupled with a high false positive rate of alerts, creates alert fatigue. This results in failure to detect complex attacks, such as advanced persistent threats (APTs), because they manifest over long time frames and attackers tread carefully to evade detection mechanisms. In this paper, we contribute a new method to synthesize attack graphs from state machines. We use the network direction to derive potential attack stages from single and meta-alerts and model resulting attack scenarios in a kill chain state machine (KCSM). Our algorithm yields a graphical summary of the attack, APT scenario graphs, where nodes represent involved hosts and edges infection activity. We evaluate the feasibility of our approach in multiple experiments based on the CSE-CIC-IDS2018 data set. We obtain up to 446 458 singleton alerts that our algorithm condenses into 700 APT scenario graphs resulting in a reduction of up to three orders of magnitude. This reduction makes it feasible for human analysts to effectively triage potential incidents. An evaluation on the same data set, in which we embedded a synthetic yet realistic APT campaign, supports the applicability of our approach of detecting and contextualizing complex attacks. The APT scenario graphs constructed by our algorithm correctly link large parts of the APT campaign and present a coherent view to support the human analyst in further analyses.
翻译:今天,人类安全分析员在调查期间不得不进行分类的警示数量巨大,因此,他们无法应付这一任务,加上高假正率的警示率,从而产生戒备疲劳。这导致未能发现复杂的攻击,例如先进的持续威胁(APTs),因为他们在较长的时间内表现出来,袭击者为了逃避检测机制而小心地走。在本文件中,我们提供了一种新的方法,将国家机器的攻击图综合起来。我们用网络方向从单一和元警戒和模型得出潜在的攻击阶段,导致在杀人链式国家机器(KCSM)中出现攻击情景的模型。我们的算法产生了攻击的图形概要,APT情景图表,其中的节点代表了宿主和边缘感染活动。我们根据CSE-CIC-IDS2018数据集评估了多种实验方法的可行性。我们得到了446 458个单顿警报,我们的算法将攻击图压缩为700个APT情景图,从而进一步削减到三个规模。这样减少就有可能使人类分析员有效地分析潜在事件。我们用一个真实的图表来评估我们所构建的逻辑模型分析。