2019
DOI: 10.48550/arxiv.1903.08826
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On Preempting Advanced Persistent Threats Using Probabilistic Graphical Models

Abstract: This paper presents PULSAR, a framework for preempting Advanced Persistent Threats (APTs). PULSAR employs a probabilistic graphical model (specifically a Factor Graph) to infer the time evolution of an attack based on observed security events at runtime. The framework (i) learns the statistical significance of patterns of events from past attacks; (ii) composes these patterns into FGs to capture the progression of the attack; and (iii) decides on preemptive actions. The accuracy of our approach and its perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 53 publications
0
3
0
Order By: Relevance
“…Besides their visually attractive properties, the topology of a directed graph is a representation of the attack plan progression. In such graphs, each vertex represents an individual alert, which might come from a variety of security solutions, and each edge represents the progression between two alerts [8]. With their vertices comprised of security alerts, attack graphs are also sometimes called alert graphs, which is the terminology we use in this work.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides their visually attractive properties, the topology of a directed graph is a representation of the attack plan progression. In such graphs, each vertex represents an individual alert, which might come from a variety of security solutions, and each edge represents the progression between two alerts [8]. With their vertices comprised of security alerts, attack graphs are also sometimes called alert graphs, which is the terminology we use in this work.…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach requires heavy manual work, and can not handle cases when multiple attacks are carried-out simultaneously. Finally, in [8] a separate graph is defined for each single asset. This approach results in manageable graphs, but it ignores lateral movement between assets, a common tactic in APT attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation