2020
DOI: 10.1016/j.future.2020.02.015
|View full text |Cite
|
Sign up to set email alerts
|

A baseline for unsupervised advanced persistent threat detection in system-level provenance

Abstract: Advanced persistent threats (APT) are stealthy, sophisticated, and unpredictable cyberattacks that can steal intellectual property, damage critical infrastructure, or cause millions of dollars in damage. Detecting APTs by monitoring system-level activity is difficult because manually inspecting the high volume of normal system activity is overwhelming for security analysts. We evaluate the effectiveness of unsupervised batch and streaming anomaly detection algorithms over multiple gigabytes of provenance trace… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…Researchers have pointed out and scrutinized this challenge, which is to a great extent related to the failure in preventing and detecting targeted attacks using existing conventional techniques. [13] and [14] This failure has led to breaches involving confidential information and documents of organizations and government agencies. Existing methods have been ineffective in the fight against APT activities in the user, application, network and physical plane.…”
Section: Astesj Issn: 2415-6698mentioning
confidence: 99%
See 2 more Smart Citations
“…Researchers have pointed out and scrutinized this challenge, which is to a great extent related to the failure in preventing and detecting targeted attacks using existing conventional techniques. [13] and [14] This failure has led to breaches involving confidential information and documents of organizations and government agencies. Existing methods have been ineffective in the fight against APT activities in the user, application, network and physical plane.…”
Section: Astesj Issn: 2415-6698mentioning
confidence: 99%
“…A dataset of 1228 log events classified using Support Vector Machine algorithm showed an accuracy level of 98.67% [22]. Several machine learning algorithms have been proposed and applied to mitigating APT, but the most common algorithms used with APT detection and prevention are majorly: Simple Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree and Random forest [3], [14], [23] and [24]. This narrows down the machine learning algorithms to four for this study.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Berrada et al (2020), traditional security systems do not solve the problem of APTs, they are among current undetectable systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example, Barre et al [22] build a classifier to detect cyber-attacks on top of a set of features (e.g., total quantity of data written, number of system files used) extracted from the provenance data. Berrada et al [23] extract Boolean-valued features (called contexts) from the provenance graph, and treat cyber-attack detection as an anomaly detection task by using unsupervised learning technique. Xiang et al [24] extract different features from two separated platforms (i.e., PC platforms and mobile platforms), and use several machine learning algorithms to detect cyber-attacks based on the combined features.…”
Section: Related Workmentioning
confidence: 99%