Tracking Cyber Adversaries with Adaptive Indicators of Compromise
نویسندگان
چکیده
A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to sensors to allow early detection of the adversary in the future. Over time, the adversary will change tactics, techniques, and procedures (TTPs), which will also change the data generated. If the IOCs are not kept up-to-date with the adversary’s new TTPs, the adversary will no longer be detected once all of the IOCs become invalid. Tracking the Known (TTK) is the problem of keeping IOCs, in this case regular expressions (regexes), up-to-date with a dynamic adversary. Our framework solves the TTK problem in an automated, cyclic fashion to bracket a previously discovered adversary. This tracking is accomplished through a data-driven approach of self-adapting a given model based on its own detection capabilities. In our initial experiments, we found that the true positive rate (TPR) of the adaptive solution degrades much less significantly over time than the naı̈ve solution, suggesting that self-updating the model allows the continued detection of positives (i.e., adversaries). The cost for this performance is in the false positive rate (FPR), which increases over time for the adaptive solution, but remains constant for the naı̈ve solution. However, the difference in overall detection performance, as measured by the area under the curve (AUC), between the two methods is negligible. This result suggests that self-updating the model over time should be done in practice to continue to detect known, evolving adversaries.
منابع مشابه
Cyber Resiliency Engineering Overview of the Architectural Assessment Process
With the growing capability, expertise and intent of advanced cyber adversaries, it is no longer realistic to assume that one can successfully keep all adversaries out of a system infrastructure. Therefore, architecture and systems engineering must be based on the assumption that systems or components have been or can be compromised, and that missions and business functions must continue to ope...
متن کاملADAPTIVE FUZZY OUTPUT FEEDBACK TRACKING CONTROL FOR A CLASS OF NONLINEAR TIME-VARYING DELAY SYSTEMS WITH UNKNOWN BACKLASH-LIKE HYSTERESIS
This paper considers the problem of adaptive output feedback tracking control for a class of nonstrict-feedback nonlinear systems with unknown time-varying delays and unknown backlash-like hysteresis. Fuzzy logic systems are used to estimate the unknown nonlinear functions. Based on the Lyapunov–Krasovskii method, the control scheme is constructed by using the backstepping and adaptive techniqu...
متن کاملMathematical Analysis of Optimal Tracking Interval Management for Power Efficient Target Tracking Wireless Sensor Networks
In this paper, we study the problem of power efficient tracking interval management for distributed target tracking wireless sensor networks (WSNs). We first analyze the performance of a distributed target tracking network with one moving object, using a quantitative mathematical analysis. We show that previously proposed algorithms are efficient only for constant average velocity objects howev...
متن کاملPrivacy for Key-Trees with Adaptive Adversaries⋆
Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye & Veugen [3] devised trees to withstand such attacks, but assumed adversaries to be non-adaptive, without acce...
متن کاملDoppler and bearing tracking using fuzzy adaptive unscented Kalman filter
The topic of Doppler and Bearing Tracking (DBT) problem is to achieve a target trajectory using the Doppler and Bearing measurements. The difficulty of DBT problem comes from the nonlinearity terms exposed in the measurement equations. Several techniques were studied to deal with this topic, such as the unscented Kalman filter. Nevertheless, the performance of the filter depends directly on the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1712.07671 شماره
صفحات -
تاریخ انتشار 2017