论文标题
使用系统级出处图的威胁检测和调查:调查
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
论文作者
论文摘要
随着信息技术的发展,网络空间的边界变得更加广泛,暴露于攻击者越来越多的脆弱性。传统的基于缓解的防御策略在应对当前的复杂情况方面具有挑战性。安全从业者迫切需要更好的工具来描述和建模防御攻击。 出处图似乎是具有强大语义表达能力和攻击历史相关能力的威胁建模的理想方法。在本文中,我们首先介绍了有关系统级出处图的基本概念,并提出了基于图形的威胁检测和调查的典型系统体系结构。综合基于图形的威胁检测系统可以分为三个模块,即“数据收集模块”,“数据管理模块”和“威胁检测模块”。每个模块包含多个组件,并涉及许多研究问题。我们系统地分析了所涉及的算法和设计细节。相比之下,我们提供了技术选择的策略。此外,我们指出了现有工作的缺点,以进行未来的改进。
With the development of information technology, the border of the cyberspace gets much broader, exposing more and more vulnerabilities to attackers. Traditional mitigation-based defence strategies are challenging to cope with the current complicated situation. Security practitioners urgently need better tools to describe and modelling attacks for defence. The provenance graph seems like an ideal method for threat modelling with powerful semantic expression ability and attacks historic correlation ability. In this paper, we firstly introduce the basic concepts about system-level provenance graph and proposed typical system architecture for provenance graph-based threat detection and investigation. A comprehensive provenance graph-based threat detection system can be divided into three modules, namely, "data collection module", "data management module", and "threat detection modules". Each module contains several components and involves many research problem. We systematically analyzed the algorithms and design details involved. By comparison, we give the strategy of technology selection. Moreover, we pointed out the shortcomings of the existing work for future improvement.