Detecting Adversary using Windows Digital Artifacts
Title | Detecting Adversary using Windows Digital Artifacts |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Liew, Seng Pei, Ikeda, Satoshi |
Conference Name | 2019 IEEE International Conference on Big Data (Big Data) |
Keywords | advanced persistent threat, adversary detection, application compatibility cache, APT, composability, Estimation, file execution, Forensics Investigation, History, Incident Response, learning (artificial intelligence), machine learning, malicious behaviors, Metrics, Microsoft Windows, Microsoft Windows (operating systems), Prefetching, pubcrawl, resilience, Resiliency, security of data, Sensors, Shimcache, Task Analysis, third-party sensors, Windows digital artifacts, Windows Operating System Security, Windows operating systems, XTEC |
Abstract | We consider the possibility of detecting malicious behaviors of the advanced persistent threat (APT) at endpoints during incident response or forensics investigations. Specifically, we study the case where third-party sensors are not available; our observables are obtained solely from inherent digital artifacts of Windows operating systems. What is of particular interest is an artifact called the Application Compatibility Cache (Shimcache). As it is not apparent from the Shimcache when a file has been executed, we propose an algorithm of estimating the time of file execution up to an interval. We also show guarantees of the proposed algorithm's performance and various possible extensions that can improve the estimation. Finally, combining this approach with methods of machine learning, as well as information from other digital artifacts, we design a prototype system called XTEC and demonstrate that it can help hunt for the APT in a real-world case study. |
URL | https://ieeexplore.ieee.org/document/9006552/ |
DOI | 10.1109/BigData47090.2019.9006552 |
Citation Key | liew_detecting_2019 |
- microsoft windows
- XTEC
- Windows operating systems
- Windows Operating System Security
- Windows digital artifacts
- third-party sensors
- Task Analysis
- Shimcache
- sensors
- security of data
- Resiliency
- resilience
- pubcrawl
- Prefetching
- Microsoft Windows (operating systems)
- advanced persistent threat
- Metrics
- malicious behaviors
- machine learning
- learning (artificial intelligence)
- Incident Response
- History
- Forensics Investigation
- file execution
- estimation
- composability
- APT
- application compatibility cache
- adversary detection