A Rule Mining-based Advanced Persistent Threats Detection System

Sidahmed Benabderrahmane*, Ghita Berrada, James Cheney, Petko Valtchev

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

2 Citations (Scopus)

Abstract

Advanced persistent threats (APT) are stealthy cyber-attacks that are aimed at stealing valuable information from target organizations and tend to extend in time. Blocking all APTs is impossible, security experts caution, hence the importance of research on early detection and damage limitation. Whole-system provenance-tracking and provenance trace mining are considered promising as they can help find causal relationships between activities and flag suspicious event sequences as they occur. We introduce an unsupervised method that exploits OS-independent features reflecting process activity to detect realistic APT-like attacks from provenance traces. Anomalous processes are ranked using both frequent and rare event associations learned from traces. Results are then presented as implications which, since interpretable, help leverage causality in explaining the detected anomalies. When evaluated on Transparent Computing program datasets (DARPA), our method outperformed competing approaches.
Original languageEnglish
Title of host publicationProceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI-21
EditorsZhi-Hua Zhou
Pages3589-3596
DOIs
Publication statusPublished - Aug 2021
Event30th International Joint Conference on Artificial Intelligence - Montreal-themed virtual reality, Canada
Duration: 19 Aug 202126 Aug 2021
https://ijcai-21.org/

Conference

Conference30th International Joint Conference on Artificial Intelligence
Abbreviated titleIJCAI-21
Country/TerritoryCanada
CityMontreal-themed virtual reality
Period19/08/202126/08/2021
Internet address

Keywords

  • Multidisciplinary Topics and Applications: Security and Privacy
  • Data Mining: Frequent Pattern Mining
  • Data Mining: Anomaly/Outlier Detection

Fingerprint

Dive into the research topics of 'A Rule Mining-based Advanced Persistent Threats Detection System'. Together they form a unique fingerprint.

Cite this