Enabling Visual Analytics via Alert-driven Attack Graphs

A. Nadeem, S.E. Verwer, Stephen Moskal, Shanchieh Jay Yang

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

5 Citations (Scopus)
129 Downloads (Pure)

Abstract

Attack graphs (AG) are a popular area of research that display all the paths an attacker can exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert input regarding vulnerabilities and network topology. In this work, we advocate the use of AGs that are built directly using the actions observed through intrusion alerts, without prior expert input. We have developed an unsupervised visual analytics system, called SAGE, to learn alert-driven attack graphs. We show how these AGs (i) enable forensic analysis of prior attacks, and (ii) enable proactive defense by providing relevant threat intelligence regarding attacker strategies. We believe that alert-driven AGs can play a key role in AI-enabled cyber threat intelligence as they open up new avenues for attacker strategy analysis whilst reducing analyst workload.
Original languageEnglish
Title of host publicationCCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery (ACM)
Pages2420-2422
Number of pages3
ISBN (Print)978-1-4503-8454-4
DOIs
Publication statusPublished - 2021
EventACM SIGSAC Conference on Computer and Communications Security - Virtual
Duration: 15 Nov 202119 Nov 2021
https://www.sigsac.org/ccs/CCS2021/

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

ConferenceACM SIGSAC Conference on Computer and Communications Security
Abbreviated titleCCS
Period15/11/2119/11/21
Internet address

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care

Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Attack graphs
  • Intrusion alerts
  • Finite state automaton
  • attack graphs
  • finite state automaton
  • intrusion alerts

Fingerprint

Dive into the research topics of 'Enabling Visual Analytics via Alert-driven Attack Graphs'. Together they form a unique fingerprint.

Cite this