About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_27,
        author={Yuedong Pan and Lijun Cai and Tao Leng and Lixin Zhao and Jiangang Ma and Aimin Yu and Dan Meng},
        title={AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Host-based intrusion detection Graph neural network Attack migration},
        doi={10.1007/978-3-031-25538-0_27}
    }
    
  • Yuedong Pan
    Lijun Cai
    Tao Leng
    Lixin Zhao
    Jiangang Ma
    Aimin Yu
    Dan Meng
    Year: 2023
    AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_27
Yuedong Pan1, Lijun Cai1,*, Tao Leng1, Lixin Zhao1, Jiangang Ma1, Aimin Yu1, Dan Meng1
  • 1: Institute of Information Engineering
*Contact email: cailijun@iie.ac.cn

Abstract

In an enterprise environment, intrusion detection systems generate many threat alerts on anomalous events every day, and these alerts may involve certain steps of a long-dormant advanced persistent threat (APT). In this paper, we present AttackMiner, an attack detection framework that combines contextual information from audit logs. Our main observation is that the same attack behavior may occur in various possible contexts, and combining various possible contextual information can provide more effective information for detecting such attacks. We utilize a combination of provenance graph causal analysis and deep learning techniques to build a graph-structure-based model that builds key patterns of attack graphs and benign graphs from audit logs. During detection, the detection system creates provenance graphs using the input audit logs. After being optimized by our customized graph optimization mechanism, it identifies whether an attack has occurred. Our evaluations on the DARPA TC dataset show that AttackMiner can successfully detect attack behaviors with high accuracy and efficiency. Through this effort, we provide security investigators with a new approach of identifying attack activity from audit logs.

Keywords
Host-based intrusion detection Graph neural network Attack migration
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_27
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL