Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

New Intrusion Detection Approach to Enhance Detection

admin by admin
Aug 14, 2023
in News
A A
0

Structured audit logs, known as provenance graphs, outline system execution history, and recent studies investigate using them for automated host intrusion detection, stressing on APTs mainly.

The following cybersecurity researchers from their respective institutions and universities conducted a new study in which they unveiled “KAIROS”:-

  • Zijun Cheng (School of Cyber Security, University of Chinese Academy of Sciences, China, Institute of Information Engineering, Chinese Academy of Sciences, China)
  • Qiujian Lv (Institute of Information Engineering, Chinese Academy of Sciences, China)
  • Jinyuan Liang (University of British Columbia, British Columbia, Canada)
  • Degang Sun (Institute of Information Engineering, Chinese Academy of Sciences, China)
  • Thomas Pasquier (University of British Columbia, British Columbia, Canada)
  • Xueyuan Han (Wake Forest University, North Carolina, United States)

While KAIROS is the new practical intrusion detection approach that improves the performance of the detection.

KAIROS utilizes the unique graph neural network encoder-decoder to learn temporal provenance graph structural changes, and then it measures the degree of the unusual event effectively.

New intrusion detection employs kernel-level causal dependency graphs. It detects provenance malicious events that may appear identical but differ due to temporal or spatial aspects.

System-level Data Provenance

The data provenance at the system level tracks flows among kernel objects like:-

While the provenance graph models the interactions with directed edges representing system call results.

KAIROS primarily analyzes the network-wide kernel interactions, which is essential for detecting complex intrusions like APTs that span hosts and applications.

Provenance summary graph (Source – Arxiv)

KAIROS Intrusion Detection

KAIROS detects APTs, and reconstructs scenarios without prior attack knowledge, but assumes existing system hardening for audit framework security.

For anomaly detection in provenance graphs, correlating anomalies based on kernel object info flows, KAIROS utilizes advanced deep graph learning with causal dependencies.

Not only that, even for efficient human-in-the-loop forensic analysis, KAIROS also offers concise, insightful summary graphs.

Here below, we have mentioned the four major components of the architecture of KAIROS:-

  • Graph Construction and Representation
  • Graph Learning
  • Anomaly Detection
  • Anomaly Investigation
KAIROS’ architecture (Source – Arxiv)

Besides this, for datasets, researchers opted two options:-

Here, the researchers utilized DARPA’s TC and OpTC program datasets, simulating real-world APTs on enterprise networks. 

While the red team launched attacks on security-critical services while engaging in benign activities. A separate team employed provenance capture systems (CADETS, ClearScope, THEIA) across platforms for host activity recording.

KAIROS is one of the first systems in its category that detects anomalies and forms attack graphs without prior information. Apart from this, it excels in real-time monitoring, outperforms competitors, and adds minimal load.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.