skip to main content
10.1145/2991079.2991122acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

HERCULE: attack story reconstruction via community discovery on correlated log graph

Published:05 December 2016Publication History

ABSTRACT

Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such attack patterns leave their footprints spatio-temporally dispersed across many different logs in victim machines. However, existing log-mining intrusion analysis systems typically target only a single type of log to discover evidence of an attack and therefore fail to exploit fundamental inter-log connections. The output of such single-log analysis can hardly reveal the complete attack story for complex, multi-stage attacks. Additionally, some existing approaches require heavyweight system instrumentation, which makes them impractical to deploy in real production environments. To address these problems, we present HERCULE, an automated multi-stage log-based intrusion analysis system. Inspired by graph analytics research in social network analysis, we model multi-stage intrusion analysis as a community discovery problem. HERCULE builds multi-dimensional weighted graphs by correlating log entries across multiple lightweight logs that are readily available on commodity systems. From these, HERCULE discovers any "attack communities" embedded within the graphs. Our evaluation with 15 well known APT attack families demonstrates that HERCULE can reconstruct attack behaviors from a spectrum of cyber attacks that involve multiple stages with high accuracy and low false positive rates.

References

  1. Target ignored hacker alarms as crooks took 40m credit cards. www.theregister.co.uk/2014/03/14/target_failed_to_act_on_security_alerts/, 2014.Google ScholarGoogle Scholar
  2. C. Abad, J. Taylor, C. Sengul, W. Yurcik, Y. Zhou, and K. Rowe. Log correlation for intrusion detection: A proof of concept. In Proceddings of the 19th Annual Computer Security Applications Conference, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Watering hole attack on aerospace firm exploits cve-2015-5122 to install isspace backdoor. researchcenter.paloaltonetworks.com/2015/07/watering-hole-attack-on-aerospace-firm-exploits-cve-2015-5122-to-install-isspace-backdoor/, 2015.Google ScholarGoogle Scholar
  4. M. Almgren and E. Jonsson. Using active learning in intrusion detection. In Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Amann, S. Hall, and R. Sommer. Count me in: Viable distributed summary statistics for securing high-speed networks. In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou II, and D. Dagon. Detecting malware domains at the upper dns hierarchy. In Proceedings of the 20th USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou II, S. Abu-Nimeh, W. Lee, and D. Dagon. From throw-away traffic to bots: Detecting the rise of dga-based malware. In Proceedings of the 21st USENIX Security Symposium, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Apt kill chain - part 5 : Access strenghtening and lateral movements. http://blog.airbuscybersecurity.com/post/2014/11/APT-Kill-chain-Part-5-%3A-Access-Strenghtening-and-lateral-movements, 2014.Google ScholarGoogle Scholar
  9. Dtl-06282015-01: Apt on taiwan - insight into advances of adversary ttps. blog.dragonthreatlabs.com/2015/07/dtl-06282015-01-apt-on-taiwan-insight.html, 2015.Google ScholarGoogle Scholar
  10. M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Proceedings of the 10th International Symposium on Research in Attacks, Intrusions and Defenses, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel. Disclosure: Detecting botnet command and control servers through large-scale netflow analysis. In Proceedings of the 28th Annual Computer Security Applications Conference, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Black vine: Formidable cyberespionage group targeted aerospace, healthcare since 2012. www.symantec.com/connect/blogs/black-vine-formidable-cyberespionage-group-targeted-aerospace-healthcare-2012, 2015.Google ScholarGoogle Scholar
  13. V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008.Google ScholarGoogle Scholar
  14. K. Borders and A. Prakash. Web tap: detecting covert web traffic. In Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. I. Buch and R. Park. Improve debugging and performance tuning with etw. MSDN Magazine, 2007.Google ScholarGoogle Scholar
  16. D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. A quantitative study of accuracy in system call-based malware detection. In Proceedings of the 2012 International Symposium on Software Testing and Analysis, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Cipriano, A. Zand, A. Houmansadr, C. Kruegel, and G. Vigna. Nexat: A history-based approach to predict attacker actions. In Proceedings of the 27th Annual Computer Security Applications Conference, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Complimentary Report. www2.fireeye.com/WEB-2015RPTM-Trends.html, 2015.Google ScholarGoogle Scholar
  19. C. Cortes and V. Vapnik. Support-vector networks. Mach. Learn., 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. R. Crandall, G. Wassermann, D. A. de Oliveira, Z. Su, S. F. Wu, and F. T. Chong. Temporal search: Detecting hidden malware timebombs with virtual machines. In The 2006 ACM Sigplan Notices, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Cylance spear team: A threat actor resurfaces. blog.cylance.com/spear-a-threat-actor-resurfaces, 2015.Google ScholarGoogle Scholar
  22. S. K. Dash, G. Suarez-Tangil, S. Khan, K. Tam, M. Ahmadi, J. Kinder, and L. Cavallaro. Droidscribe: Classifying android malware based on runtime behavior. Mobile Security Technologies (MOST), 2016.Google ScholarGoogle ScholarCross RefCross Ref
  23. B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Duke apt group's latest tools: cloud services and linux support. www.f-secure.com/weblog/archives/00002822.html, 2015.Google ScholarGoogle Scholar
  25. A. Goel, W.-c. Feng, W.-c. Feng, and D. Maier. Automatic high-performance reconstruction and recovery. Computer Networks, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. G. Gu, P. A. Porras, V. Yegneswaran, M. W. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16thth USENIX Security Symposium, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Z. Gu, K. Pei, Q. Wang, L. Si, X. Zhang, and D. Xu. Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis. In Proceedings of the 45th IEEE/IFIP International Conference on Dependable Systems and Networks, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Unpatched flash player flaw, more pocs found in hacking team leak. blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/, 2015.Google ScholarGoogle Scholar
  29. X. Jiang, A. Walters, D. Xu, E. H. Spafford, F. Buchholz, and Y.-M. Wang. Provenance-aware tracing of worm break-in and contaminations: A process coloring approach. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. G. Kang, S. McCamant, P. Poosankam, and D. Song. Dta++: Dynamic taint analysis with targeted control-flow propagation. In Proceedings of the 18th Network and Distributed System Security Symposium, 2011.Google ScholarGoogle Scholar
  31. A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna. Revolver: An automated approach to the detection of evasive web-based malware. In Proceedings of the 22nd USENIX Security Symposium, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. H. Kim, J. Rhee, H. Zhang, N. Arora, G. Jiang, X. Zhang, and D. Xu. Introperf: transparent context-sensitive multi-layer performance inference using system stack traces. In Proceedings of the 2014 ACM International Conference on Measurement and Modeling of Computer Systems, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. S. T. King, Z. M. Mao, D. G. Lucchetti, and P. M. Chen. Enriching intrusion alerts through multi-host causality. In Proceedings of the 12th Network and Distributed System Security Symposium, 2005.Google ScholarGoogle Scholar
  35. C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In Proceedings of the 18th Conference on USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. H. Lee, X. Zhang, and D. Xu. High accuracy attack provenance via binary-based execution partition. In Proceedings of the 20th Network and Distributed System Security Symposium, 2013.Google ScholarGoogle Scholar
  37. S. Lee and J. Kim. Warningbird: Detecting suspicious urls in twitter stream. In Proceedings of the 19th Network and Distributed System Security Symposium, 2012.Google ScholarGoogle Scholar
  38. Libsvm. https://www.csie.ntu.edu.tw/~cjlin/libsvm/.Google ScholarGoogle Scholar
  39. Louvain community detection api in python. http://perso.crans.org/aynaud/communities/api.html.Google ScholarGoogle Scholar
  40. S. Ma, X. Zhang, and D. Xu. Protracer: Towards practical provenance tracing by alternating between logging and tainting. In Proceedings of the 2016 Network and Distributed System Security Symposium, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  41. F. Maggi, M. Matteucci, and S. Zanero. Detecting intrusions through system call sequence and argument analysis. IEEE Transactions on Dependable and Secure Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Matlab glmfit. http://www.mathworks.com/help/stats/glmfit.html.Google ScholarGoogle Scholar
  43. Matlab quadratic programming. http://www.mathworks.com/help/optim/ug/quadprog.html.Google ScholarGoogle Scholar
  44. P. McCullagh and J. A. Nelder. Generalized linear models. CRC press, 1989.Google ScholarGoogle Scholar
  45. Nessus vulnerability scanner. http://www.tenable.com/products/nessus-vulnerability-scanner.Google ScholarGoogle Scholar
  46. J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 12th Network and Distributed System Security Symposium, 2005.Google ScholarGoogle Scholar
  47. Operation clandestine fox now attacking windows xp using recently discovered ie vulnerability. www.fireeye.com/blog/threat-research/2014/05/operation-clandestine-fox-now-attacking-windows-xp-using-recently-discovered-ie-vulnerability.html, 2014.Google ScholarGoogle Scholar
  48. Operation deputydog: Zero-day (cve-2013-3893) attack against japanese targets. www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html, 2013.Google ScholarGoogle Scholar
  49. Operation russiandoll: Adobe & windows zero-day exploits likely leveraged by russia's apt28 in highly-targeted attack. www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html, 2015.Google ScholarGoogle Scholar
  50. Operation tropic trooper: Old vulnerabilities still pack a punch. blog.trendmicro.com/trendlabs-security-intelligence/operation-tropic-trooper-old-vulnerabilities-still-pack-a-punch/, 2015.Google ScholarGoogle Scholar
  51. A. Oprea, Z. Li, T.-F. Yen, S. Chin, and S. Alrwais. Detection of early-stage enterprise infection by mining large-scale log data. In Proceedings of the 45th IEEE/IFIP International Conference on Dependable Systems and Networks, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Analysis of computer intrusions using sequences of function calls. IEEE Transactions on Dependable and Secure Computing, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. F. Peng, Z. Deng, X. Zhang, D. Xu, Z. Lin, and Z. Su. X-force: Force-executing binary programs for security applications. In Proceedings of the 23rd USENIX Security Symposium, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. R. Perdisci, A. Lanzi, and W. Lee. Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables. In Proceedings of the 24th Annual Computer Security Applications Conference, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi, K. Rieck, S. Fahl, and Y. Acar. Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. C. Piro, C. Shields, and B. N. Levine. Detecting the sybil attack in mobile ad hoc networks. In Proceddings of the 2nd International Conference on Security and Privacy in Communication Networks, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  57. M. Polychronakis and N. Provos. Ghost turns zombie: Exploring the life cycle of web-based malware. 2008.Google ScholarGoogle Scholar
  58. C. Rossow and C. J. Dietrich. Provex: Detecting botnets with encrypted command and control channels. In Proceedings of the 10th SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. X. Shu, D. D. Yao, and N. Ramakrishnan. Unearthing stealthy program attacks buried in extremely long execution paths. In Proceedings of the 22nd ACM Conference on Computer and Communications Security, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. Bitblaze: A new approach to computer security via binary analysis. In Proceedings of the 4th International Conference on Information Systems Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Targeted attacks against tibetan and hong kong groups exploiting cve-2014-4114. citizenlab.org/2015/06/targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114/, 2015.Google ScholarGoogle Scholar
  62. V. Total. Virustotal-free online virus, malware and url scanner, 2012.Google ScholarGoogle Scholar
  63. A. G. West, A. J. Aviv, J. Chang, and I. Lee. Spam mitigation using spatio-temporal reputations from blacklist history. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. H. Zhang, D. D. Yao, and N. Ramakrishnan. Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. In Proceedings of the 9th ACM symposium on Information, computer and communications security, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. H. Zhang, D. D. Yao, N. Ramakrishnan, and Z. Zhang. Causality reasoning about network events for detecting stealthy malware activities. computers & security, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
    December 2016
    614 pages
    ISBN:9781450347716
    DOI:10.1145/2991079

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 5 December 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate104of497submissions,21%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader