These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
Modern cyber attackers use advanced zero-day exploits, highly targeted spear
phishing, and other social engineering techniques to gain access and also use
evasion techniques to maintain a prolonged presence within the victim network
while working gradually towards the objective. To minimize the damage, it is
necessary to detect these Advanced Persistent Threats as early in the campaign
as possible. This paper proposes, Prov2Vec, a system for the continuous
monitoring of enterprise host's behavior to detect attackers' activities. It
leverages the data provenance graph built using system event logs to get
complete visibility into the execution state of an enterprise host and the
causal relationship between system entities. It proposes a novel provenance
graph kernel to obtain the canonical representation of the system behavior,
which is compared against its historical behaviors and that of other hosts to
detect the deviation from the normality. These representations are used in
several machine learning models to evaluate their ability to capture the
underlying behavior of an endpoint host. We have empirically demonstrated that
the provenance graph kernel produces a much more compact representation
compared to existing methods while improving prediction ability.