Share your thoughts, 1 month free Claude Pro on usSee more
WorkDL logo mark

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

About

Provenance graphs are structured audit logs that describe the history of a system's execution. Recent studies have explored a variety of techniques to analyze provenance graphs for automated host intrusion detection, focusing particularly on advanced persistent threats. Sifting through their design documents, we identify four common dimensions that drive the development of provenance-based intrusion detection systems (PIDSes): scope (can PIDSes detect modern attacks that infiltrate across application boundaries?), attack agnosticity (can PIDSes detect novel attacks without a priori knowledge of attack characteristics?), timeliness (can PIDSes efficiently monitor host systems as they run?), and attack reconstruction (can PIDSes distill attack activity from large provenance graphs so that sysadmins can easily understand and quickly respond to system intrusion?). We present KAIROS, the first PIDS that simultaneously satisfies the desiderata in all four dimensions, whereas existing approaches sacrifice at least one and struggle to achieve comparable detection performance. Kairos leverages a novel graph neural network-based encoder-decoder architecture that learns the temporal evolution of a provenance graph's structural changes to quantify the degree of anomalousness for each system event. Then, based on this fine-grained information, Kairos reconstructs attack footprints, generating compact summary graphs that accurately describe malicious activity over a stream of system audit logs. Using state-of-the-art benchmark datasets, we demonstrate that Kairos outperforms previous approaches.

Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han• 2023

Related benchmarks

TaskDatasetResultRank
Anomaly DetectionOPTC H051
True Positives1
7
Anomaly DetectionOPTC H201
TP1
7
Anomaly DetectionOPTC H501
True Positives Count (TP)1
7
Attack DetectionDARPA E3 CADETS
True Positives (TP)0.00e+0
7
Attack DetectionDARPA THEIA E3
True Positives (TP)4
7
Attack DetectionDARPA CADETS E5
TP0.00e+0
7
Attack DetectionDARPA THEIA E5
TP0.00e+0
7
Anomaly DetectionE5-CADETS
True Positives (TP)6
2
Anomaly DetectionE5-ClearScope
TP3
2
Anomaly DetectionE3-CADETS
True Positives (TP)7
2
Showing 10 of 13 rows

Other info

Follow for update