System auditing has emerged as a key approach for monitoring system call events and investigating sophisticated attacks. Based on the collected audit logs, research has proposed to search for attack patterns or track the causal dependencies of system events to reveal the attack sequence. However, existing approaches either cannot reveal long-range attack sequences or suffer from the dependency explosion problem due to a lack of focus on attack-relevant parts, and thus are insufficient for investigating complex attacks. To bridge the gap, we propose Zebra, a system that synergistically integrates attack pattern search and causal dependency tracking for efficient attack investigation. With Zebra, security analysts can alternate between search and tracking to reveal the entire attack sequence in a progressive, user-guided manner, while mitigating the dependency explosion problem by prioritizing the attack-relevant parts. To enable this, Zebra provides (1) an expressive and concise domain-specific language, Tstl, for performing various types of search and tracking analyses, and (2) an optimized language execution engine for efficient execution over a big amount of auditing data. Evaluations on a broad set of attack cases demonstrate the effectiveness of Zebra in facilitating a timely attack investigation.
翻译:系统审计已成为监测系统呼叫事件和调查复杂袭击的关键方法。根据所收集的审计日志,研究建议寻找攻击模式或跟踪系统事件因果依赖性,以披露袭击序列;然而,现有方法要么无法披露远程袭击序列,要么由于缺乏对袭击相关部分的关注而面临依赖性爆炸问题,因此不足以调查复杂的袭击。为弥补这一差距,我们提议Zebra,这是一个将攻击模式搜索和因果依赖性跟踪协同结合起来,以便高效袭击调查的系统。Zebra,安全分析员可以在搜索和跟踪之间进行交替,以渐进、用户指导的方式披露整个袭击序列,同时通过优先考虑袭击相关部分来减轻依赖性爆炸问题。为了能够做到这一点,Zebra提供了(1) 一种明确和简洁的域专用语言,即Tstl,用于进行各种搜索和跟踪分析,以及(2) 一种最优化的语言执行引擎,以便对大量审计数据进行高效执行。对一系列袭击案件的评价表明Zebra在及时袭击调查方面的有效性。