Visible to the public "Concept for a security investigation framework"Conflict Detection Enabled

Title"Concept for a security investigation framework"
Publication TypeConference Paper
Year of Publication2015
AuthorsM. Ussath, F. Cheng, C. Meinel
Conference Name2015 7th International Conference on New Technologies, Mobility and Security (NTMS)
Date PublishedJuly
PublisherIEEE
ISBN Number978-1-4799-8784-9
Accession Number15475678
Keywordsadvanced persistent threat, advanced persistent threat campaigns, APT, APT campaigns, Companies, Correlation, forensic investigations, Forensics, Investigation Framework, lateral movement, log files, Malware, malware analyses, multi-stage APT, Multi-Stage Attack, pubcrawl170101, reliability, security investigation framework, security systems, SIF, Standards, telecommunication security, Trace Attacks
Abstract

The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected by existing security systems. During an investigation of an APT campaign all stages of it are relevant to clarify important details like the initial infection vector or the compromised systems and credentials. Most of the currently used approaches, which are utilized within security systems, are not able to detect the different stages of a complex attack and therefore a comprehensive security investigation is needed. In this paper we describe a concept for a Security Investigation Framework (SIF) that supports the analysis and the tracing of multi-stage APTs. The concept includes different automatic and semi-automatic approaches that support the investigation of such attacks. Furthermore, the framework leverages different information sources, like log files and details from forensic investigations and malware analyses, to give a comprehensive overview of the different stages of an attack. The overall objective of the SIF is to improve the efficiency of investigations and reveal undetected details of an attack.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7266478&isnumber=7266450
DOI10.1109/NTMS.2015.7266478
Citation Key7266478