"Concept for a security investigation framework"
Title | "Concept for a security investigation framework" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | M. Ussath, F. Cheng, C. Meinel |
Conference Name | 2015 7th International Conference on New Technologies, Mobility and Security (NTMS) |
Date Published | July |
Publisher | IEEE |
ISBN Number | 978-1-4799-8784-9 |
Accession Number | 15475678 |
Keywords | advanced persistent threat, advanced persistent threat campaigns, APT, APT campaigns, Companies, Correlation, forensic investigations, Forensics, Investigation Framework, lateral movement, log files, Malware, malware analyses, multi-stage APT, Multi-Stage Attack, pubcrawl170101, reliability, security investigation framework, security systems, SIF, Standards, telecommunication security, Trace Attacks |
Abstract | The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected by existing security systems. During an investigation of an APT campaign all stages of it are relevant to clarify important details like the initial infection vector or the compromised systems and credentials. Most of the currently used approaches, which are utilized within security systems, are not able to detect the different stages of a complex attack and therefore a comprehensive security investigation is needed. In this paper we describe a concept for a Security Investigation Framework (SIF) that supports the analysis and the tracing of multi-stage APTs. The concept includes different automatic and semi-automatic approaches that support the investigation of such attacks. Furthermore, the framework leverages different information sources, like log files and details from forensic investigations and malware analyses, to give a comprehensive overview of the different stages of an attack. The overall objective of the SIF is to improve the efficiency of investigations and reveal undetected details of an attack. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7266478&isnumber=7266450 |
DOI | 10.1109/NTMS.2015.7266478 |
Citation Key | 7266478 |
- malware
- Trace Attacks
- telecommunication security
- standards
- SIF
- security systems
- security investigation framework
- Reliability
- pubcrawl170101
- Multi-Stage Attack
- multi-stage APT
- malware analyses
- advanced persistent threat
- log files
- lateral movement
- Investigation Framework
- Forensics
- forensic investigations
- Correlation
- Companies
- APT campaigns
- APT
- advanced persistent threat campaigns