SAGE: Intrusion Alert-driven Attack Graph Extractor

Conference Paper (2021)
Author(s)

A. Nadeem (TU Delft - Cyber Security)

Sicco Verwer (TU Delft - Cyber Security)

Shanchieh Jay Yang (Rochester Institute of Technology)

Research Group
Cyber Security
Copyright
© 2021 A. Nadeem, S.E. Verwer, Shanchieh Jay Yang
DOI related publication
https://doi.org/10.1109/VizSec53666.2021.00009
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 A. Nadeem, S.E. Verwer, Shanchieh Jay Yang
Related content
Research Group
Cyber Security
Pages (from-to)
36-41
ISBN (print)
978-1-6654-2086-0
ISBN (electronic)
978-1-6654-2085-3
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities based on network scans and expert knowledge. In real-world operations however, it is costly and ineffective to rely on constant vulnerability scanning and expert-crafted AGs.
We propose to automatically learn AGs based on actions observed through intrusion alerts, without prior expert knowledge. Specifically, we develop an unsupervised sequence learning system, SAGE, that leverages the temporal and probabilistic dependence between alerts in a suffix-based probabilistic deterministic finite automaton (S-PDFA) -- a model that accentuates infrequent severe alerts and summarizes paths leading to them. AGs are then derived from the S-PDFA on a per-objective, per-victim basis.
Tested with intrusion alerts collected through Collegiate Penetration Testing Competition, SAGE compresses over 330k alerts into 93 AGs. These AGs reflect the strategies used by the participating teams. The AGs are succinct, interpretable, and capture behavioral dynamics, e.g., that attackers will often follow shorter paths to re-exploit objectives.

Files

SAGE_Intrusion_Alert_driven_At... (pdf)
(pdf | 1.3 Mb)
- Embargo expired in 07-06-2022
License info not available