• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Li, Teng (Li, Teng.) [1] | Liu, Ximeng (Liu, Ximeng.) [2] (Scholars:刘西蒙) | Qiao, Wei (Qiao, Wei.) [3] | Zhu, Xiongjie (Zhu, Xiongjie.) [4] | Shen, Yulong (Shen, Yulong.) [5] | Ma, Jianfeng (Ma, Jianfeng.) [6]

Indexed by:

EI Scopus SCIE

Abstract:

Advanced Persistent Threats (APTs) employ sophisticated and covert tactics to infiltrate target systems, leading to increased vulnerability and an elevated risk of exposure. Consequently, it is essential for us to proactively create an extensive and clearly outlined attack chain for APTs in order to effectively combat these threats. Unlike traditional malware or application threats, APTs can sidestep cyber security efforts and cause severe damage to organizations or even state security. Nonetheless, earlier methods struggle to accurately track APTs and may face a dependency explosion issue, as identifying the intricate and complex unknown malicious activities within APTs proves to be challenging. In this paper, we propose and build an approach, T-trace, which constructs the events provenance graphs by analyzing the correlations among logs. The approach precisely finds the log communities with tensor decomposition and calculates significance scores to extract the events. The APTs can be inferred by discovering the event communities and constructing the provenance graph with log correlation. In the experiment, we used DARPA data sets and launched four current practical APTs. Compared with current approaches, the results show that T-trace can efficiently reduce time cost by 90% and achieve a 92% accuracy rate in constructing the provenance graph, which can be practically applied in APTs provenance.

Keyword:

APTs Behavioral sciences Correlation Explosions Feature extraction forensic system log analysis provenance Remote control tensor decomposition Tensors Training data

Community:

  • [ 1 ] [Li, Teng]Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
  • [ 2 ] [Zhu, Xiongjie]Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
  • [ 3 ] [Ma, Jianfeng]Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
  • [ 4 ] [Liu, Ximeng]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Peoples R China
  • [ 5 ] [Qiao, Wei]Chinese Acad Sci, Inst Informat Engn, Beijing 100085, Peoples R China
  • [ 6 ] [Shen, Yulong]Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China

Reprint 's Address:

  • [Liu, Ximeng]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Peoples R China;;

Show more details

Version:

Related Keywords:

Related Article:

Source :

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING

ISSN: 1545-5971

Year: 2024

Issue: 3

Volume: 21

Page: 1179-1195

7 . 0 0 0

JCR@2023

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:1434/13861274
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1