论文标题

MAAC:检测多步攻击的新型警报相关方法

MAAC: Novel Alert Correlation Method To Detect Multi-step Attack

论文作者

Wang, Xiaoyu, Gong, Xiaorui, Yu, Lei, Liu, Jian

论文摘要

随着攻击方法的持续改进,越来越多的分布式,复杂,有针对性的攻击使用攻击者使用合并的攻击方法实现目的。高级网络攻击包括多个阶段以实现最终目标。传统的入侵检测系统,例如端点安全管理工具,防火墙和其他监视工具,在攻击过程中会产生大量警报。这些警报包括攻击线索,以及许多与攻击无关的误报。安全分析师需要分析大量警报,并从中找到有用的线索并重建攻击方案。但是,大多数传统的安全监控工具无法将不同来源的警报相关联,因此许多多步攻击仍然完全没有引起注意,需要安全分析师的手动分析,例如在Haystack中找到针头。我们提出了MAAC,这是一个多步攻击警报相关系统,该系统减少了重复的警报,并根据警报语义和攻击阶段结合了多步攻击路径。实际数据集的评估结果表明,MAAC可以有效地将警报降低90 \%,并从大量警报中找到攻击路径。

With the continuous improvement of attack methods, there are more and more distributed, complex, targeted attacks in which the attackers use combined attack methods to achieve the purpose. Advanced cyber attacks include multiple stages to achieve the ultimate goal. Traditional intrusion detection systems such as endpoint security management tools, firewalls, and other monitoring tools generate a large number of alerts during the attack. These alerts include attack clues, as well as many false positives unrelated to attacks. Security analysts need to analyze a large number of alerts and find useful clues from them and reconstruct attack scenarios. However, most traditional security monitoring tools cannot correlate alerts from different sources, so many multi-step attacks are still completely unnoticed, requiring manual analysis by security analysts like finding a needle in a haystack. We propose MAAC, a multi-step attack alert correlation system, which reduces repeated alerts and combines multi-step attack paths based on alert semantics and attack stages. The evaluation results of the real-world datasets show that MAAC can effectively reduce the alerts by 90\% and find attack paths from a large number of alerts.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源