论文标题
使用用户行为分析的横向运动检测
Lateral Movement Detection Using User Behavioral Analysis
论文作者
论文摘要
横向运动是指威胁参与者最初访问网络的方法,然后通过上述网络逐步移动有关资产的关键数据,直到达到其攻击的最终目标。随着企业网络的复杂性和相互联系的性质的增加,横向运动的入侵变得更加复杂,并且需要同样复杂的检测机制,以便在企业范围内接近实时地实时检测此类威胁。在本文中,作者提出了一种使用用户行为分析和机器学习的新颖,轻巧的方法,用于横向运动检测。具体而言,本文介绍了一种用于网络域特异性特征工程的新方法,该方法可以以每个用户为基础识别横向运动行为。此外,工程功能还用于开发两个监督的机器学习模型,用于横向运动识别,这些模型明显优于先前在文献中看到的模型,同时在具有高级失衡的数据集上保持了稳健的性能。本文中介绍的模型和方法还与安全操作员合作设计,以相关且可解释,以最大程度地发挥影响力并最大程度地减少作为网络威胁检测工具包的价值。本文的基本目标是提供一种计算高效的,特定于域的方法,以近实时的实时横向运动检测,对企业规模的数据量和阶级不平衡是可解释且健壮的。
Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated detection mechanisms to proactively detect such threats in near real-time at enterprise scale. In this paper, the authors propose a novel, lightweight method for Lateral Movement detection using user behavioral analysis and machine learning. Specifically, this paper introduces a novel methodology for cyber domain-specific feature engineering that identifies Lateral Movement behavior on a per-user basis. Furthermore, the engineered features have also been used to develop two supervised machine learning models for Lateral Movement identification that have demonstrably outperformed models previously seen in literature while maintaining robust performance on datasets with high class imbalance. The models and methodology introduced in this paper have also been designed in collaboration with security operators to be relevant and interpretable in order to maximize impact and minimize time to value as a cyber threat detection toolkit. The underlying goal of the paper is to provide a computationally efficient, domain-specific approach to near real-time Lateral Movement detection that is interpretable and robust to enterprise-scale data volumes and class imbalance.