通信学报

• •    

基于系统溯源图的威胁发现与取证分析综述

冷涛 1,2,31,2,3, 蔡利君 1, 于爱民 1,21,2, 朱子元 1,21,2, 马建刚 1,李超飞 1,21,2, 牛瑞丞 1,21,2, 孟丹 1,2   

  1. 1. 中国科学院信息工程研究所 北京 中国 100093100093;2. 中国科学院大学网络空间安全学院 北京 中国 100049100049;
    3. 四川警察学院智能警务四川 省重点实验室, 四川 泸州 646000646000
  • 作者简介:冷涛(1986年− ),男,四川合江人,中国科学院大学博士生,四川警察学院副教授,主要研究方向为APT攻击检测、取证分析。 蔡利君(1988年− ),男,河南汝南人,博士,中科院信息工程研究所助理研究员,主要研究方向为攻击检测、内部威胁检测。 于爱民(1980年− ),男,山西临汾人,博士,中国科学院信息工程研究所正高级工程师、博士生导师,主要研究方向为可信软件测评、基于大数据的行为异常检测。 朱子元(1980年− ),男,河南汝州人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为处理器安全技术、系统安全理论与技术等。 Based Approach for Robust Cyber Threat Hunting[ EB /OL]. arXiv preprint a rXiv:2104.09806, 2021. [89] Noel S, Harley E, Tam K H, et al. CyGraph: graph graph-based analytics and visualization for cybersecurity[M].Handbook of Statistics. Elsevier, 2016, 35: 117 117-167. [90] Shu X, Araujo F, Schales D L, et al. Threat intelligence computing [ Proce edings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018: 18831883-1898. [91] Karuna P, Hemberg E, O'Reilly U M, et al. Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation[ J]. arXiv preprint arXiv:2104.11576, 2021. [92] Milajerdi S M, Eshete B, Gjomemo R, et al. Propatrol: Attack investigation via extracted high high-level tasks [ International Conference on Information Systems Security. Springer, Cham, 2018: 107 107-126. [93] Allen J, Yang Z, Landen M, et al . Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System [ Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020: 787 787-802. [94] Newsome J, Song D X. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software [ NDSS. 2005, 5: 3 3-4. [95] Yin H, Song D, Egele M, et al. Panorama: capturing system system-wide information flow for malware detection and analysis [ Proceedings of the 14th ACM confe rence on Computer and communications security. 2007: 116 116-127. [96] Ji Y, Lee S, Downing E, et al. Rain: Refinable attack investigation with on on-demand inter inter-process information flow tracking[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Commu nications Security. 2017: 377 377-390. [97] Kwon Y, Kim D, Sumner W N, et al. Ldx: Causality inference by lightweight dual execution [ Proceedings of the Twenty Twenty-First International Conference on Architectural Support for Programming Languages and Operating System s. 2016: 503 503-515. [98] Kwon Y, Wang F, Wang W, et al. MCI: Modeling Modeling-based Causality Inference in Audit Logging for Attack Investigation [ NDSS. 2018. [99] Pei K, Gu Z, Saltaformaggio B, et al. Hercule: Attack story reconstruction via community discovery on correla ted log graph [ Proceedings of the 32Nd Annual Conference on Computer Security Applications. 2016: 583 583-595. [100] Shen Y, Mariconti E, Vervier P A, et al. Tiresias: Predicting security events through deep learning [ Proceedings of the 2018 ACM SIGSAC Confere nce on Computer and Communications Security. 2018: 592 592-605. [101] Shen Y, Stringhini G. Attack2vec: Leveraging temporal word embeddings to understand the evolution of cyberattacks [ 28th {USENIX} Security Symposium ({USENIX} Security 19). 2019: 905905-921. [102] Alsahe el A, Nan Y, Ma S, et al. {ATLAS}: A Sequence Sequence-based Learning Approach for Attack Investigation[C]//30th {USENIX} Security Symposium ({USENIX} Security 21). 2021. [103] Zong B, Xiao X, Li Z, et al. Behavior query discovery in systemsystem-generated temporal graphs[ J].a rXiv preprint arXiv:1511.05911, 2015. [104] 潘亚峰 ,周天阳 ,朱俊虎 ,曾子懿 .基于 ATT&CK 的 APT 攻击语 义规则构建 [ 信息安全学报 ,2021,6(03):77 77-90. Pan Yafeng,Zhou Tianyang,Zhu Junhu,Zeng Ziyi. Semantic rule construction for APT attacks based on ATT&CK[J]. Journal of Information Security,2021,6(03):7 77-90. [105] R. Yang et al.RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows[J] J].IEEE Trans. Dependable and Secure Comput..2020: 1–1 [作者简介 ] 《通信学报》 李超飞(1994年− ),男,河南汝州人,中国科学院大学博士生,主要研究方向为加密流量、深度学习等。 牛瑞丞(1994年− ),男,云南昆明人,中国科学院大学博士生,主要研究方向为恶意代码检测、深度学习等。 孟丹(1965年− ),男,黑龙江人,博士,中国科学院信息工程研究所所长、研究员、博士生导师,主要研究方向为计算机系统安全、云计算安全等。

A Review of Threat Discovery and Forensic Analysis Based on System-level Provenance Graphs

LENG T Tao 1,2,3 ,CAI lijun lijun1,YU Aimin 1,2 ,ZHU ziyuan 1,21,2, M A Jian ganggang1,LI Caofei 1,2 ,NIU Ruicheng 1,2 ,MENG Dan 1,2#br#   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sc iences, Beijing 100049 100049,China
    3. Intelligent Policing Key Laboratory of Sichuan Province Province,SiChuan Police College, Sichuan 646000 , China

摘要: 通过调研 溯源图研究相关的文献,提出了基于系统溯源图的网络威胁发现和取证分析研究框架 。详细 综述 了基于溯源图的 数据采集 、数据管理 、数据查询和可视化方法 ;提出基于 规则、基于异常和基于学习的威胁检测分
类方法 ;概括了基于威胁情报 或基于战略、技术、过程驱动的威胁狩猎方法 ;总结 出基于因果关系、序列学习、特
殊领域语言查询 和语义重建的取证分析方法 ;最后 指出 未来的研究 趋势 。

关键词: 溯源图;高级持续威胁;威胁 发现 

Abstract: By investigating works of literature related to provenance graph research, a research framework for network
threat discovery and for ensic analysis based on systemsystem-level provenance graph is proposed. A detailed overview of data
collection, data management, data query, and visualization methods based on provenance graphs is provided ; proposed
rulerule-based, anomaly anomaly-based, and learning learning-based threat detection classification methods; summarized threats based on
threat intelligence or based on strategy, technology, and process process-driven threats Hunting method; summarized forensic
analysis methods based on causality, sequence learning, language quer y and semantic reconstruction in special fields;
finally pointed out future research trends.

Key words: provenance graph, advanced persistent threats, threat discoverydiscovery, forensics analysis, graph neural network

No Suggested Reading articles found!