An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement
Title | An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Atul Bohara, University of Illinois at Urbana-Champaign, Mohammad A. Noureddine, University of Illinois at Urbana-Champaign, Ahmed Fawaz, University of Illinois at Urbana-Champaign, William Sanders, University of Illinois at Urbana-Champaign |
Conference Name | IEEE 36th Symposium on Reliable Distributed Systems (SRDS) |
Date Published | 10/19/17 |
Publisher | IEEE |
Conference Location | Hong Kong, Hong Kong |
Keywords | advanced persistent threat, advanced persistent threats, anomaly detection, command and control, lateral movement, pubcrawl, science of security |
Abstract | Abstract--Lateral movement-based attacks are increasingly leading to compromises in large private and government networks, often resulting in information exfiltration or service disruption. Such attacks are often slow and stealthy and usually evade existing security products. To enable effective detection of such attacks, we present a new approach based on graph-based modeling of the security state of the target system and correlation of diverse indicators of anomalous host behavior. We believe that irrespective of the specific attack vectors used, attackers typically establish a command and control channel to operate, and move in the target system to escalate their privileges and reach sensitive areas. Accordingly, we identify important features of command and control and lateral movement activities and extract them from internal and external communication traffic. Driven by the analysis of the features, we propose the use of multiple anomaly detection techniques to identify compromised hosts. These methods include Principal Component Analysis, k-means clustering, and Median Absolute Deviation-based utlier detection. We evaluate the accuracy of identifying compromised hosts by using injected attack traffic in a real enterprise network dataset, for various attack communication models. Our results show that the proposed approach can detect infected hosts with high accuracy and a low false positive rate. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8069085 |
DOI | 10.1109/SRDS.2017.31 |
Citation Key | node-39033 |