Alert-driven Attack Graph Generation using S-PDFA

Journal Article (2022)
Author(s)

A. Nadeem (TU Delft - Cyber Security)

S.E. Verwer (TU Delft - Cyber Security)

Stephen Moskal (Rochester Institute of Technology)

Shanchieh Jay Yang (Rochester Institute of Technology)

Research Group
Cyber Security
Copyright
© 2022 A. Nadeem, S.E. Verwer, Stephen Moskal, Shanchieh Jay Yang
DOI related publication
https://doi.org/10.1109/TDSC.2021.3117348
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 A. Nadeem, S.E. Verwer, Stephen Moskal, Shanchieh Jay Yang
Related content
Research Group
Cyber Security
Issue number
2
Volume number
19
Pages (from-to)
731-746
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical representation, often referred to as an attack graph (AG). Instead of deriving AGs based on system vulnerabilities, this work advocates the direct use of intrusion alerts. We propose SAGE, an explainable sequence learning pipeline that automatically constructs AGs from intrusion alerts without a priori expert knowledge. SAGE exploits the temporal and probabilistic dependence between alerts in a suffix-based probabilistic deterministic finite automaton (S-PDFA) — a model that brings infrequent severe alerts into the spotlight and summarizes paths leading to them. Attack graphs are extracted from the model on a per-victim, per-objective basis. SAGE is thoroughly evaluated on three open-source intrusion alert datasets collected through security testing competitions in order to analyze distributed multi-stage attacks. SAGE compresses over 330k alerts into 93 AGs that show how specific attacks transpired. The AGs are succinct, interpretable, and provide directly relevant insights into strategic differences and fingerprintable paths. They even show that attackers tend to follow shorter paths after they have discovered a longer one in 84.5% of the cases.

Files

Alert_Driven_Attack_Graph_Gene... (pdf)
(pdf | 6.18 Mb)
- Embargo expired in 01-10-2022
License info not available