论文标题
使用基于图和流的安全遥测使用零日报检测
Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
论文作者
论文摘要
零日期威胁(ZDT)是恶意参与者用来攻击和利用信息技术(IT)网络或基础架构的新方法。在过去的几年中,这些威胁的数量一直在以惊人的速度增加,并使组织累积了数百万美元的补救措施。网络攻击表面的扩展日益扩展以及这些网络上的资产数量成倍增长,需要建立强大的基于AI的零日报检测模型,该模型可以快速分析Pabyte尺度数据,以实现潜在的恶意和新型活动。在本文中,作者介绍了一种基于深度学习的方法,以实时概括,扩展和有效地识别威胁。该方法利用了具有资产级图特征的网络流遥测增强,这些图分别通过双自动编码器结构,分别用于异常和新颖性检测。这些模型已经在代表现实世界组织网络的四个大型数据集上进行了培训和测试,并以高精度和召回值产生了强大的结果。这些模型提供了一种新的方法来检测低阳性速率的复杂威胁,使安全操作员能够避免警报疲劳,同时大幅度地减少了他们通过近实时检测的响应时间。此外,作者还提供了一种由对抗活动产生的新颖,标记的网络攻击数据集,可用于验证或培训其他模型。在本文的情况下,作者的总体目标是为网络异常检测器提供一种新颖的架构和培训方法,这些探测器可以推广到多个IT网络,而在仍然保持强劲的性能的同时,可以将其概括为最少至没有重新培训。
Zero Day Threats (ZDT) are novel methods used by malicious actors to attack and exploit information technology (IT) networks or infrastructure. In the past few years, the number of these threats has been increasing at an alarming rate and have been costing organizations millions of dollars to remediate. The increasing expansion of network attack surfaces and the exponentially growing number of assets on these networks necessitate the need for a robust AI-based Zero Day Threat detection model that can quickly analyze petabyte-scale data for potentially malicious and novel activity. In this paper, the authors introduce a deep learning based approach to Zero Day Threat detection that can generalize, scale, and effectively identify threats in near real-time. The methodology utilizes network flow telemetry augmented with asset-level graph features, which are passed through a dual-autoencoder structure for anomaly and novelty detection respectively. The models have been trained and tested on four large scale datasets that are representative of real-world organizational networks and they produce strong results with high precision and recall values. The models provide a novel methodology to detect complex threats with low false-positive rates that allow security operators to avoid alert fatigue while drastically reducing their mean time to response with near-real-time detection. Furthermore, the authors also provide a novel, labelled, cyber attack dataset generated from adversarial activity that can be used for validation or training of other models. With this paper, the authors' overarching goal is to provide a novel architecture and training methodology for cyber anomaly detectors that can generalize to multiple IT networks with minimal to no retraining while still maintaining strong performance.