1. Detection and Threat Prioritization of Pivoting Attacks in Large Networks
- Author
-
Mirco Marchetti, Giovanni Apruzzese, Fabio Pierazzi, Michele Colajanni, APRUZZESE, GIOVANNI, Pierazzi, Fabio, Colajanni, Michele, and Marchetti, Mirco
- Subjects
Computer science ,Proposal ,0211 other engineering and technologies ,Evasion (network security) ,Information System ,02 engineering and technology ,Algorithm design and analysis ,Detection algorithms ,graph ,island-hopping ,lateral movement ,Malware ,Organizations ,pivoting ,Proposals ,Protocols ,Security ,Computer Science (miscellaneous) ,Information Systems ,Human-Computer Interaction ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Computer security ,computer.software_genre ,Set (abstract data type) ,Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Algorithm design and analysi ,021110 strategic, defence & security studies ,Event (computing) ,Flow network ,Computer Science Applications ,Graph (abstract data type) ,020201 artificial intelligence & image processing ,Algorithm design ,Detection algorithm ,computer ,Organization - Abstract
Several advanced cyber attacks adopt the technique of "pivoting" through which attackers create a command propagation tunnel through two or more hosts in order to reach their final target. Identifying such malicious activities is one of the most tough research problems because of several challenges: command propagation is a rare event that cannot be detected through signatures, the huge amount of internal communications facilitates attackers evasion, timely pivoting discovery is computationally demanding. This paper describes the first pivoting detection algorithm that is based on network flows analyses, does not rely on any a-priori assumption on protocols and hosts, and leverages an original problem formalization in terms of temporal graph analytics. We also introduce a prioritization algorithm that ranks the detected paths on the basis of a threat score thus letting security analysts investigate just the most suspicious pivoting tunnels. Feasibility and effectiveness of our proposal are assessed through a broad set of experiments that demonstrate its higher accuracy and performance against related algorithms.
- Published
- 2020
- Full Text
- View/download PDF