21
A Context-Based Detection Framework for Advanced Persistent Threats 2012 International Conference on Cyber Security Paul Giura , Wei Wang AT&T Security Research Center, New York, NY 報報報 : 報報報

A Context-Based Detection Framework for Advanced Persistent Threats

  • Upload
    buffy

  • View
    140

  • Download
    2

Embed Size (px)

DESCRIPTION

A Context-Based Detection Framework for Advanced Persistent Threats. 2012 International Conference on Cyber Security Paul Giura , Wei Wang AT&T Security Research Center, New York, NY. 報告者 : 黃希鈞. Outline. INTRODUCTION ATTACK MODEL DETECTION FRAMEWORK EVALUATION CONCLUSION. - PowerPoint PPT Presentation

Citation preview

Page 1: A Context-Based Detection Framework  for Advanced  Persistent Threats

A Context-Based Detection Framework for

Advanced Persistent Threats2012 International Conference on Cyber Security

Paul Giura , Wei WangAT&T Security Research Center, New York, NY

報告者 :黃希鈞

Page 2: A Context-Based Detection Framework  for Advanced  Persistent Threats

Outline

• INTRODUCTION • ATTACK MODEL • DETECTION FRAMEWORK • EVALUATION • CONCLUSION

Page 3: A Context-Based Detection Framework  for Advanced  Persistent Threats

INTRODUCTION

• APT can best be defined using the words deriving the acronym.• Advanced (A)• Persistent (P)• Threat (T)

• APTs are characterized as “low and slow” advanced operations.

Page 4: A Context-Based Detection Framework  for Advanced  Persistent Threats

• APTs are very hard, if not impossible, to detect with conventional network defense mechanisms.

INTRODUCTION

Page 5: A Context-Based Detection Framework  for Advanced  Persistent Threats

ATTACK MODEL

• A. Attack Tree• A threat tree is a method to represent a threat in a tree structure,

first introduced by Edward Amoroso, and later popularized by Bruce Schneier as an attack tree.

Page 6: A Context-Based Detection Framework  for Advanced  Persistent Threats

• B. Attack Pyramid• The goal of the attack is placed at the top of the pyramid, and the

lateral planes represent the environments where the attack evolves

ATTACK MODEL

Page 7: A Context-Based Detection Framework  for Advanced  Persistent Threats

• C. Events1) Candidate Event• All the events recorded by an organization logging mechanisms in

any form.

2) Suspicious Events• Events reported by the security mechanisms as suspicious, or

represent events associated with abnormal or unexpected activity.

3) Attack Events• Events that traditional security systems aim to detect with regard

to a specific attack activity.

ATTACK MODEL

Page 8: A Context-Based Detection Framework  for Advanced  Persistent Threats

• D. Planes• There is rarely the same way to reach the goal by applying the

same sequence of techniques because attackers tend to avoid repeating the same pattern to not be caught.

ATTACK MODEL

Page 9: A Context-Based Detection Framework  for Advanced  Persistent Threats

• D. Planes1) Physical plane• Records all the events that associate possible targets with

physical devices or working locations.

2) User plane• Captures the social engineering process that happens in APTs.

3) Network plane• All the events recorded by network flow sensors, firewalls,

routers, VPN access, intrusion detection and prevention systems will be recorded in this plane.

ATTACK MODEL

Page 10: A Context-Based Detection Framework  for Advanced  Persistent Threats

• D. Planes4) Application plane• Application gateways (such as http, SIP, RTP, DNS, email, p2p, SSH,

ftp, telnet, DHCP, etc.), server and end host application logs will be recorded in this plane.

5) Other planes• Organizations can easily expand the attack pyramid model by

adding other interesting planes.

ATTACK MODEL

Page 11: A Context-Based Detection Framework  for Advanced  Persistent Threats

DETECTION FRAMEWORK

• A. Detection Framework Design

Page 12: A Context-Based Detection Framework  for Advanced  Persistent Threats

• B. Pyramids and Goals• Suppose we consider a set of g goals to protect G = {G1, . . . , Gg}.• = {, . . . , }.

• C. Planes and Events• = {, . . . , } and

• , . . . , are the attributes for all the events in plane Pi.

DETECTION FRAMEWORK

Page 13: A Context-Based Detection Framework  for Advanced  Persistent Threats

• D. Correlation Rules• After collecting the events from various sensors feeds, one

important problem is to correlate the events relevant to an attack context.

• represents the correlation rules set for events in planesand .

DETECTION FRAMEWORK

Page 14: A Context-Based Detection Framework  for Advanced  Persistent Threats

• D. Correlation Rules• Essentially, if we consider the events as points in pyramid planes,

a correlation rule creates an edge between correlated events

DETECTION FRAMEWORK

Page 15: A Context-Based Detection Framework  for Advanced  Persistent Threats

• E. Detection Rules1) Signature based rules• Require checking the new observed events and behavior against

known attacks and malicious behavior.

2) Profiling based rules• Require checking the observed profile and behavior of the

monitored entity with profile and behavior baselines.

3) Policy based rules• Are the static rules based on the organization policies.

DETECTION FRAMEWORK

Page 16: A Context-Based Detection Framework  for Advanced  Persistent Threats

• F. Attack Context• We define an attack context as a set of events correlated across

multiple planes.

• = {E,R,W,H,C,L,G}

• where represents the the detection confidence and the weight of an attack event in plane i.

DETECTION FRAMEWORK

Page 17: A Context-Based Detection Framework  for Advanced  Persistent Threats

DETECTION FRAMEWORK

Page 18: A Context-Based Detection Framework  for Advanced  Persistent Threats

EVALUATION

• Data: • Recording events in the network plane (VPN logs, IDS logs and

firewall logs) and application plane (authentication logs and Internet proxy logs).

Page 19: A Context-Based Detection Framework  for Advanced  Persistent Threats

EVALUATION

• Correlation Rules, Profiles, Contexts:1) First, the events were normalized to the format in Section III.2) Builting profiles for users with user ID (UID) attribute not

null in at least one recorded event.• If the UID was null for one event, we built profile for the source IP

recoded in the event.

• Any two events are correlated and added to the same profile if they had the same UID or the same source IP attributes.

Page 20: A Context-Based Detection Framework  for Advanced  Persistent Threats

EVALUATION

• Detection:• As expected, the number of attacks detected increases as the

confidence threshold decreases, because of the false positives inherited from the detection mechanisms in each plane.

Page 21: A Context-Based Detection Framework  for Advanced  Persistent Threats

CONCLUSION

• This paper introduce the attack pyramid model, starting from the attack trees and provide an APT detection framework that takes into account all the events in an organization.

• In future work we plan to investigate different methods to assess the confidence and risk for each attack context, while using a larger number of feeds and a richer set of correlation and detection rules.