论文标题

加热警报分类(热):可转让学习以提取多阶段攻击运动

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns

论文作者

Moskal, Stephen, Yang, Shanchieh Jay

论文摘要

随着网络攻击的越来越复杂和数量,结合了复杂的网络结构,安全分析师很难证实证据来识别其网络上的多阶段活动。这项工作会发展热量(加热警报分类):鉴于妥协的关键指标(IOC),例如,严重的IDS警报,热量会产生加热攻击运动(HAC),描绘了导致关键事件的多阶段活动。我们定义了“警报情节热”的概念,以代表分析师的意见,即鉴于他们对网络和安全专业知识的了解,事件对关键IOC的攻击运动有何贡献。 HEAT利用网络不可或缺的功能集,了解分析师对一小部分IOC的“热量”评估的本质,并应用学习的模型来提取以前从未见过的IOC的洞察力攻击运动,即使是通过转移已学到的知识的跨越网络。我们通过在大学渗透测试竞赛(CPTC)中收集的数据以及与现实世界中的SOC合作,证明了热量的能力。与使用IP地址来证实证据相比,我们开发了热增强指标,以证明分析师如何评估和受益于提取的攻击运动。我们的结果表明,通过发现跨越各种攻击阶段的活动,删除大量无关紧要的警报,并与分析师的原始评估达到一致性,这表明了热量的实际用途。

With growing sophistication and volume of cyber attacks combined with complex network structures, it is becoming extremely difficult for security analysts to corroborate evidences to identify multistage campaigns on their network. This work develops HeAT (Heated Alert Triage): given a critical indicator of compromise (IoC), e.g., a severe IDS alert, HeAT produces a HeATed Attack Campaign (HAC) depicting the multistage activities that led up to the critical event. We define the concept of "Alert Episode Heat" to represent the analysts opinion of how much an event contributes to the attack campaign of the critical IoC given their knowledge of the network and security expertise. Leveraging a network-agnostic feature set, HeAT learns the essence of analyst's assessment of "HeAT" for a small set of IoC's, and applies the learned model to extract insightful attack campaigns for IoC's not seen before, even across networks by transferring what have been learned. We demonstrate the capabilities of HeAT with data collected in Collegiate Penetration Testing Competition (CPTC) and through collaboration with a real-world SOC. We developed HeAT-Gain metrics to demonstrate how analysts may assess and benefit from the extracted attack campaigns in comparison to common practices where IP addresses are used to corroborate evidences. Our results demonstrates the practical uses of HeAT by finding campaigns that span across diverse attack stages, remove a significant volume of irrelevant alerts, and achieve coherency to the analyst's original assessments.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源