ProPatrol: Attack Investigation via Extracted High-Level Tasks

10/12/2018
by   Sadegh M Milajerdi, et al.
0

Kernel audit logs are an invaluable source of information in the forensic investigation of a cyber-attack. However, the coarse granularity of dependency information in audit logs leads to the construction of huge attack graphs which contain false or inaccurate dependencies. To overcome this problem, we propose a system, called ProPatrol, which leverages the open compartmentalized design in families of enterprise applications used in security-sensitive contexts (e.g., browser, chat client, email client). To achieve its goal, ProPatrol infers a model for an application's high-level tasks as input-processing compartments using purely the audit log events generated by that application. The main benefit of this approach is that it does not rely on source code or binary instrumentation, but only on a preliminary and general knowledge of an application's architecture to bootstrap the analysis. Our experiments with enterprise-level attacks demonstrate that ProPatrol significantly cuts down the forensic investigation effort and quickly pinpoints the root- cause of attacks. ProPatrol incurs less than 2

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/10/2022

Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation

System auditing has emerged as a key approach for monitoring system call...
research
07/17/2023

LogPrécis: Unleashing Language Models for Automated Shell Log Analysis

The collection of security-related logs holds the key to understanding a...
research
12/18/2021

System Attack Modeling Techniques Critical Information Infrastructure

Every day around the world, various organizations are exposed to more th...
research
07/21/2019

Secure and Transparent Audit Logs with BlockAudit

Audit logs serve as a critical component in enterprise business systems ...
research
09/03/2019

GrAALF:Supporting Graphical Analysis of Audit Logs for Forensics

System-call level audit logs often play a critical role in computer fore...
research
06/07/2023

IsoEx: an explainable unsupervised approach to process event logs cyber investigation

39 seconds. That is the timelapse between two consecutive cyber attacks ...
research
03/18/2022

Active Meta-Learner for Log Analysis

The analysis of logs is a vital activity undertaken for cyber investigat...

Please sign up or login with your details

Forgot password? Click here to reset