
Research Article
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
@INPROCEEDINGS{10.1007/978-3-031-25538-0_27, author={Yuedong Pan and Lijun Cai and Tao Leng and Lixin Zhao and Jiangang Ma and Aimin Yu and Dan Meng}, title={AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs}, proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, proceedings_a={SECURECOMM}, year={2023}, month={2}, keywords={Host-based intrusion detection Graph neural network Attack migration}, doi={10.1007/978-3-031-25538-0_27} }
- Yuedong Pan
Lijun Cai
Tao Leng
Lixin Zhao
Jiangang Ma
Aimin Yu
Dan Meng
Year: 2023
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
SECURECOMM
Springer
DOI: 10.1007/978-3-031-25538-0_27
Abstract
In an enterprise environment, intrusion detection systems generate many threat alerts on anomalous events every day, and these alerts may involve certain steps of a long-dormant advanced persistent threat (APT). In this paper, we present AttackMiner, an attack detection framework that combines contextual information from audit logs. Our main observation is that the same attack behavior may occur in various possible contexts, and combining various possible contextual information can provide more effective information for detecting such attacks. We utilize a combination of provenance graph causal analysis and deep learning techniques to build a graph-structure-based model that builds key patterns of attack graphs and benign graphs from audit logs. During detection, the detection system creates provenance graphs using the input audit logs. After being optimized by our customized graph optimization mechanism, it identifies whether an attack has occurred. Our evaluations on the DARPA TC dataset show that AttackMiner can successfully detect attack behaviors with high accuracy and efficiency. Through this effort, we provide security investigators with a new approach of identifying attack activity from audit logs.