Enabling Visual Analytics via Alert-driven Attack Graphs

Conference Paper (2021)
Author(s)

Azqa Nadeem (TU Delft - Cyber Security)

Sicco Verwer (TU Delft - Cyber Security)

Stephen Moskal (Rochester Institute of Technology)

Shanchieh Jay Yang (Rochester Institute of Technology)

Research Group
Cyber Security
Copyright
© 2021 A. Nadeem, S.E. Verwer, Stephen Moskal, Shanchieh Jay Yang
DOI related publication
https://doi.org/10.1145/3460120.3485361
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 A. Nadeem, S.E. Verwer, Stephen Moskal, Shanchieh Jay Yang
Related content
Research Group
Cyber Security
Pages (from-to)
2420-2422
ISBN (print)
978-1-4503-8454-4
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Attack graphs (AG) are a popular area of research that display all the paths an attacker can exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert input regarding vulnerabilities and network topology. In this work, we advocate the use of AGs that are built directly using the actions observed through intrusion alerts, without prior expert input. We have developed an unsupervised visual analytics system, called SAGE, to learn alert-driven attack graphs. We show how these AGs (i) enable forensic analysis of prior attacks, and (ii) enable proactive defense by providing relevant threat intelligence regarding attacker strategies. We believe that alert-driven AGs can play a key role in AI-enabled cyber threat intelligence as they open up new avenues for attacker strategy analysis whilst reducing analyst workload.

Files

3460120.3485361_1_.pdf
(pdf | 2.32 Mb)
- Embargo expired in 13-05-2022
License info not available