Journal on Communications ›› 2022, Vol. 43 ›› Issue (7): 172-188.doi: 10.11959/j.issn.1000-436x.2022105

• Comprehensive Reviews • Previous Articles     Next Articles

Review of threat discovery and forensic analysis based on system provenance graph

Tao LENG1,2,2, Lijun CAI1, Aimin YU1,2, Ziyuan ZHU1,2, Jian’gang MA1, Chaofei LI1,2, Ruicheng NIU1,2, Dan MENG1,2   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3 Intelligent Policing Key Laboratory of Sichuan Province, Sichuan Police College, Luzhou 646000, China
  • Revised:2022-04-20 Online:2022-07-25 Published:2022-06-01
  • Supported by:
    The Strategic Priority Research Program of Chinese Academy of Sciences(XDC02040200);Intelligent Po-licing Key Laboratory of Sichuan Province(ZNJW2022ZZQN002)

Abstract:

By investigating works of literature related to provenance graph research, a research framework for network threat discovery and forensic analysis based on system-level provenance graph was proposed.A detailed overview of data collection, data management, data query, and visualization methods based on provenance graphs was provided.The rule-based, anomaly-based, and learning-based threat detection classification methods were proposed.Threats based on threat intelligence or based on strategy, technology, and process-driven threats hunting methods were summarized.Forensic analysis methods based on causality, sequence learning, language query and semantic reconstruction in special fields were summarized.Finally, the future research trends were pointed out.

Key words: provenance graph, advanced persistent threat, threat discovery, forensic analysis, graph neural network

CLC Number: 

No Suggested Reading articles found!