Visible to the public Detecting Adversary using Windows Digital Artifacts

TitleDetecting Adversary using Windows Digital Artifacts
Publication TypeConference Paper
Year of Publication2019
AuthorsLiew, Seng Pei, Ikeda, Satoshi
Conference Name2019 IEEE International Conference on Big Data (Big Data)
Keywordsadvanced persistent threat, adversary detection, application compatibility cache, APT, composability, Estimation, file execution, Forensics Investigation, History, Incident Response, learning (artificial intelligence), machine learning, malicious behaviors, Metrics, Microsoft Windows, Microsoft Windows (operating systems), Prefetching, pubcrawl, resilience, Resiliency, security of data, Sensors, Shimcache, Task Analysis, third-party sensors, Windows digital artifacts, Windows Operating System Security, Windows operating systems, XTEC
Abstract

We consider the possibility of detecting malicious behaviors of the advanced persistent threat (APT) at endpoints during incident response or forensics investigations. Specifically, we study the case where third-party sensors are not available; our observables are obtained solely from inherent digital artifacts of Windows operating systems. What is of particular interest is an artifact called the Application Compatibility Cache (Shimcache). As it is not apparent from the Shimcache when a file has been executed, we propose an algorithm of estimating the time of file execution up to an interval. We also show guarantees of the proposed algorithm's performance and various possible extensions that can improve the estimation. Finally, combining this approach with methods of machine learning, as well as information from other digital artifacts, we design a prototype system called XTEC and demonstrate that it can help hunt for the APT in a real-world case study.

URLhttps://ieeexplore.ieee.org/document/9006552/
DOI10.1109/BigData47090.2019.9006552
Citation Keyliew_detecting_2019