1 / 21

A Context-Based Detection Framework for Advanced Persistent Threats

A Context-Based Detection Framework for Advanced Persistent Threats. 2012 International Conference on Cyber Security Paul Giura , Wei Wang AT&T Security Research Center, New York, NY. 報告者 : 黃希鈞. Outline . INTRODUCTION ATTACK MODEL DETECTION FRAMEWORK EVALUATION CONCLUSION.

buffy
Télécharger la présentation

A Context-Based Detection Framework for Advanced Persistent Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Context-Based Detection Framework forAdvanced Persistent Threats 2012 International Conference on Cyber Security Paul Giura , Wei Wang AT&T Security Research Center, New York, NY 報告者:黃希鈞

  2. Outline • INTRODUCTION • ATTACK MODEL • DETECTION FRAMEWORK • EVALUATION • CONCLUSION

  3. INTRODUCTION • APT can best be defined using the words deriving the acronym. • Advanced (A) • Persistent (P) • Threat (T) • APTs are characterized as “low and slow” advanced operations.

  4. INTRODUCTION • APTs are very hard, if not impossible, to detect with conventional network defense mechanisms.

  5. ATTACK MODEL • A. Attack Tree • A threat tree is a method to represent a threat in a tree structure, first introduced by Edward Amoroso, and later popularized by Bruce Schneieras an attack tree.

  6. ATTACK MODEL • B. Attack Pyramid • The goal of the attack is placed at the top of the pyramid, and the lateral planes represent the environments where the attack evolves

  7. ATTACK MODEL • C. Events • Candidate Event • All the events recorded by an organization logging mechanisms in any form. • Suspicious Events • Events reported by the security mechanisms as suspicious, or represent events associated with abnormal or unexpected activity. • Attack Events • Events that traditional security systems aim to detect with regard to a specific attack activity.

  8. ATTACK MODEL • D. Planes • There is rarely the same way to reach the goal by applying the same sequence of techniques because attackers tend to avoid repeating the same pattern to not be caught.

  9. ATTACK MODEL • D. Planes • Physical plane • Records all the events that associate possible targets with physical devices or working locations. • User plane • Captures the social engineering process that happens in APTs. • Network plane • All the events recorded by network flow sensors, firewalls, routers, VPN access, intrusion detection and prevention systems will be recorded in this plane.

  10. ATTACK MODEL • D. Planes • Application plane • Application gateways (such as http, SIP, RTP, DNS, email, p2p, SSH, ftp, telnet, DHCP, etc.), server and end host application logs will be recorded in this plane. • Other planes • Organizations can easily expand the attack pyramid model by adding other interesting planes.

  11. DETECTION FRAMEWORK • A. Detection Framework Design

  12. DETECTION FRAMEWORK • B. Pyramids and Goals • Suppose we consider a set of g goals to protect G = {G1, . . . , Gg}. • = {, . . . , }. • C. Planes and Events • = {, . . . , } and • , . . . , are the attributes for all the events in plane Pi.

  13. DETECTION FRAMEWORK • D. Correlation Rules • After collecting the events from various sensors feeds, one important problem is to correlate the events relevant to an attack context. • represents the correlation rules set for events in planesand.

  14. DETECTION FRAMEWORK • D. Correlation Rules • Essentially, if we consider the events as points in pyramid planes, a correlation rule creates an edge between correlated events

  15. DETECTION FRAMEWORK • E. Detection Rules • Signature based rules • Require checking the new observed events and behavior against known attacks and malicious behavior. • Profiling based rules • Require checking the observed profile and behavior of the monitored entity with profile and behavior baselines. • Policy based rules • Are the static rules based on the organization policies.

  16. DETECTION FRAMEWORK • F. Attack Context • We define an attack context as a set of events correlated across multiple planes. • = {E,R,W,H,C,L,G} • where represents the the detection confidence and the weight of an attack event in plane i.

  17. DETECTION FRAMEWORK

  18. EVALUATION • Data: • Recording events in the network plane (VPN logs, IDS logs and firewall logs) and application plane (authentication logs and Internet proxy logs).

  19. EVALUATION • Correlation Rules, Profiles, Contexts: • First, the events were normalized to the format in Section III. • Builtingprofiles for users with user ID (UID) attribute not null in at least one recorded event. • If the UID was null for one event, we built profile for the source IP recoded in the event. • Any two events are correlated and added to the same profile if they had the same UID or the same source IP attributes.

  20. EVALUATION • Detection: • As expected, the number of attacks detected increases as the confidence threshold decreases, because of the false positives inherited from the detection mechanisms in each plane.

  21. CONCLUSION • This paper introduce the attack pyramid model, starting from the attack trees and provide an APT detection framework that takes into account all the events in an organization. • In future work we plan to investigate different methods to assess the confidence and risk for each attack context, while using a larger number of feeds and a richer set of correlation and detection rules.

More Related