• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    TDLens:Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection

    2022-10-27 04:44:54RuiMeiHanbingYanQinqinWangZhihuiHanZhuohangLyu
    China Communications 2022年10期

    Rui Mei,Hanbing Yan,Qinqin Wang,Zhihui Han,Zhuohang Lyu

    1 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China

    2 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China

    3 National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC),Beijing 100029,China

    *The corresponding author,email:yhb@cert.org.cn

    Abstract:To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in network traffc.Several studies have begun to focus on threat detection methods based on provenance data of host-level event tracing.On the other side,with the signifcant development of big data and artifcial intelligence technologies,largescale graph computing has been widely used.To this end,kinds of research try to bridge the gap between threat detection based on host log provenance data and graph algorithm,and propose the threat detection algorithm based on system provenance graph.These approaches usually generate the system provenance graph via tagging and tracking of system events,and then leverage the characteristics of the graph to conduct threat detection and attack investigation.

    Keywords:cyber threat detection;causality dependency graph;data provenance

    I.INTRODUCTION

    Modern information systems in enterprises and other organizations have been important and irreplaceable driving force for better doing business.However,these systems are constantly being targeted by not only Advanced Persistent Threats(APTs)but also disgruntled insider employees[1–4].More enterprises have begun to deploy security system such as security operation center(SOC),threat detection software(TDS),and security information and event management(SIEM)to respond to cyber threats.These systems usually continuously monitor diverse activities in hosts or enterprise network for identifying potentially suspicious activities and send alerts to cyber analysts.

    Figure 1.Reduced version of forward tracing graph for a remote access trojan(RAT)delivered by exploitation of MS Office vulnerability.

    Among those proposed threat detection approaches,a type of threat detection algorithm based on the system provenance graph is considered to be an ideal method,with strong behavioral representation capabilities and relatively high effciency.Recently,many works in the security community have focused on the application of the system provenance graph.Figure 1 shows an example of exploiting a vulnerability in MS Offce(CVE-2017-11882)to spread the trojan for subsequent command and control(C2).In the fgure,the nodes marked in red are the critical system entities of intrusion.In other words,an ideal threat detection tool can identify red nodes and their paths as abnormal activities within a relatively lower response time.Although scholars have proposed a variety of novel graph-based threat detection approaches,few studies have made empirical evaluations of these methods.In this paper,we try to conduct an in-depth analysis and empirical assessment of several representative threat detection approaches.We desire that this effort can point out the direction for the improvement of graphbased threat detection approaches.

    In summary,this paper makes the following contributions:

    ·We propose and implement a provenance graphbased analysis framework for the evaluation of threat detection algorithm.The framework has robust underlying critical modules,including operating system log collector,system provenance graph generation module,and preprocessing module.In addition,our framework also has a fexible interface for loading diverse threat detection algorithms and provides the capability on the comparison of the experiment results between multiple algorithms.

    ·We select and implement state-of-the-art threat detection approaches as evaluation objects for further evaluation.To this end,we collect benign dataset in a real-world IT environment,and simulate multiple attack scenarios in an isolated environment to collect malicious dataset.This datasets ensures the effectiveness and interpretability of the evaluation.

    ·We adopt crosswise comparison and longitudinal assessment to gain an in-depth understanding and insight into fve threat detection approaches.Our evaluation results provide a solid foundation for the improvement direction of the threat detection approach.

    1.1 Adversarial Model

    In this paper,threat detection approaches we evaluate are based on the following adversarial model:(1)Threat actors can be external attackers,who usually launch APT attacks,or insider employees with limited authorized access.(2)The adversaries deliver the attack payload through vulnerability exploitation,social engineering,etc.(3)The attack behavior will always cause changes that are inconsistent with normal behaviors,even if it is a small fuctuation.(4)The adversary does not know the details of the detection model.

    1.2 Definitions

    We list basic defnitions used in the rest of this paper.

    System Entityrefers to performers or targets of system operations which are also called the system subject and the system object respectively.Our evaluationconsiders three types of system entities:process,file,andnetwork socket.

    Table 1.The system entities and their relations we consider.

    System Eventrefers to the operation of the subject to the object.An event can be denoted by a quad

    System Provenance Graphrefers to a directed graph to denote the control dependency(e.g.,parent process start child process)and data dependency(e.g.,process send data to network socket)between subjects and objects.Formally,it is defned asG=

    Causality Dependency.Given two eventse1=

    II.GRAPH-BASED APPROACHES

    In this section,we discuss graph-based threat detection approaches.The threat model and basic defnitions described below constitute the foundation for crosswise comparison and longitudinal evaluation of several state-of-the-art detection approaches in this paper.Then,we outline the main types and characteristics of threat detection methods based on system provenance graph.Finally,we describe in detail fve representative threat detection approaches and use them as the evaluation objects for further analysis.

    2.1 Graph-Based Threat Detection

    Due to the natural attributes of the system provenance graph,the threat detection algorithm based on the graph can usually leverage two types of information,namely,the attribute information of the vertices and edges of the graph,and the structure information of the graph.Previous study[5]has shown that an ideal TDS needs to consider three indicators,namely fast response,high effciency,and high accuracy.In order to fnd a balance between these three indicators,many pieces of research have been proposed.These research works mainly are divided into three categories,which are described as follows:

    (1)Outlier Detection,aka Anomaly Detection,attempts to identify the abnormal event(i.e.,the relationship between anomalous system entities).Thus,this kind of approaches will model regular behaviors by collecting historical data or data from parallel systems.The normal model can be trained by not only manual extraction of features but also automatically embedding via machine learning.Therefore,anomaly detection algorithms are widely used for threat detection recently.

    (2)Graph Matching.The conventional graph matching method frst defnes several suspicious local structure features or vertex attributes of graphs,then fnds whether there are suspicious local structures or vertices with similar attributes in the system provenance graph for identifying cyber threats.With the help of artifcial intelligence algorithms,many recent works leverage machine learning models to automatically learn abnormal features from labeled data.In general,the graph matching method is a computationally intensive method,which requires strong computing power.

    (3)Tag Propagation.The tag propagation-based threat detection mechanism is basically to mark the entities of interest and spread the tags along the system control fow and data fow to discover potential threats.This approach mainly has two phases,namely tag initialization and tag propagation.Since this method uses an incremental approach to gradually explore the execution path,it can be applied to streaming data.

    Table 2.Comparison of provenance graph-based approaches.

    2.2 Approaches to Be Evaluated

    For the abnormal events given by the threat detection method,the cyber analyst needs to further verify whether they are true alarms.Therefore,for threat detection methods,not only the precision and effciency is required,but also the interpretability of alarms is more important.The provenance graphbased approach is more ideal for threat detection due to its interpretability and simplifcation of implementation and deployment.The representative and state-of-the-art works are ProvDetector,NoDoze,PrioTracker,Poirot,and M&L[6–10].This paper will take these fve approaches as evaluation objects for crosswise comparison and longitudinal evaluation.Table 2 shows the summary of the characteristics of these three approaches[5].Among them,A-1,A-2,and A-3 are anomaly detection approahces.A-4 adopts graph matching method for threat detection,while A-5 is a tag propagation approach.

    As an empirical evaluation,we will not review the details of these approaches in this paper.We outline their main steps as follows:

    A-1 ProvDetector[6].

    1)Calculate theregularity scoreof each edge in the system provenance graph based on its rareness and stability,which is defned as:

    In Equation(1),H(e)is the set of hosts that eventehappens on whileHis the set of all the hosts in the enterprise.INandOUTdenote the stability extent ofuandvnodes duringntime windows.

    2)Convert the directed graph(DG)into a directed acyclic graph(DAG),and fnd the top k longest paths(that is,the top k paths with the largest anomaly scores).

    3)Introduce natural language processing(NLP)technique,and generate k sentences from k paths and embedding them used by doc2vec model[11].

    4)Use the Local Outlier Factor(LOF)algorithm[12]to detect abnormal paths.

    A-2 NoDoze[7].

    1)Calculate theanomaly scoreof given dependency path in the system provenance graph based on its rareness and stability.Theanomaly scorecan be calculated as follows:

    whereINandOUTare the same as Equation(1),whileMmeans the happening probability of this specifc event.

    2)Normalize theanomaly scoreof each path based on training a bias parameter.

    3)Sort all paths with anomaly score and select top k paths based on the difference of anomaly score between two adjacent paths.

    4)Merge top k paths to a subgraph for anomaly detection.

    A-3 PrioTracker[8].

    1)Calculate therareness scoreof each edge,which is defned as:

    whereMis the same as Equation(3).Ifehas not been observed by reference model,rs(e)=1,otherwise,rs(e)=M(e).

    2)Calculate thefanout scoreof each edge,which is defned as:

    whereσis a hyperparameter and set to be 0.3 empirically,andfanout(e)is out-degree of sink node ofe.Ifereaches a read-only fle in backward tracking,fs(e)=0.Ifereaches a write-only fle in forward tracking,fs(e)=σ.Otherwise,fs(e)=1/fantout(e).

    3)Cauculate the priority score and leverage the Hill Climbing algorithm[13]to optimize the feature weights.

    In equation(6),αandβneed to be determined by the Hill Climbing algorithm.

    4)Maintain a queue to list the abnormal events based on their priority for anomaly detection by the cyber analyst before a given deadline.

    5)Continuously update the reference model to improve the accuracy of anomaly scores.

    A-4 Poirot[9].

    1)Extract Indicators of Compromise(IoCs)related to known attacks and their relationships from cyber threat intelligence,and build causal dependency graphs,namely query graphs,denoted asGq.

    2)Find all candidate matching setsi:j,whereiandjrepresent nodes inGqand system provenance graphGp,respectively.Then start from the matching with the highest matching probability(i.e.seed node),and expand the search range to fnd other node matching.

    3)Leverage node alignment and graph alignment algorithms,and extract the subgraphs fromGpwith higher similarity betweenGqandGp.

    A-5 M&L[10].

    1)Collect the logs of the service application for pretraining,and obtain the event handling loop.

    2)Initialize a tag for each system event in the event handling loop.

    3)Track the propagation of the tag in the causal dependency graph.When the propagation of the tag exceeds the current event handling loop,it will no longer be tracked.

    4)According to the tag propagation path in(3),prune irrelevant causal dependency on the system provenance graph.

    5)Adopt na¨?ve forward tracking and backward tracking to analyze suspicious events.

    III.EMPIRICAL EVALUATION

    In this section,we conduct several experiments to evaluate the correctness,effectiveness,and effciency of the aforementioned provenance threat detection approaches based on system provenance graph,and crosswise comparison between them as well.we go over the specifcs of the experiment setup and attack scenarios utilized for evaluation.Next,we present metrics for quantitatively comparing different dimensions of these techniques.Finally,we attempt to explain what caused the experiment results we observed in order to have a better understanding of the characteristics of diverse threat detection approaches.

    In particular,to evaluate the characteristics of each approach,we search for answers to the following research questions:

    RQ1:How accurate are these approaches to threat detection?(§3.3)

    RQ2:How much can these approaches reduce the causality dependency graph of a true alert without sacrifcing the vital information needed for investigation?(§3.4)

    RQ3:What are the runtime performance of these approaches?(§3.5)

    RQ4:How effective are these approaches to saving storage space of log data?(§3.6)

    3.1 Experiment Setup

    As an initial step,we designed and implemented an analysis framework for empirical evaluation of the aforementioned threat detection approaches.Figure 2 shows the evaluation framework we implemented.It mainly includes the following three parts:tagging and tracking of system events(i.e.log collection and storage),generation of system provenance graph,implementation and deployment of diverse graph-based threat detection methods for obtaining detection outputs,and comparison with assessment metrics.First,modern operating system usually has built-in system event tagging and tracking mechanism,e.g.Event Tracing for Windows(ETW)[14]in the Windows platform and Linux audit framework[15]in the Linuxplatform.We have implemented event tracking and log collection module on the two mainstream platforms of Windows and Linux respectively.For Windows,we developed a log collection agent leveraging SilkETW[16],an open source framework proposed by FireEye.For Linux,we developed a corresponding log collector based on auditd,which is natively supported in the Linux kernel.All collected log data is stored in an Elasticsearch(ES)[17]server.Next,for the captured log data of all system events,we introduced previous foundational work BackTracker[18]to generate whole-system provenance graph.To effectively store the graph data structure and facilitate subsequent graph computing,we further implemented graph-based forward tracing,backward tracing,and bidirectional tracing algorithms based on the open source framework NetworkX[19].Then,we implemented the aforementioned graph-based threat detection algorithms,carried out threat detection on consistent datasets,and output the threat detection results.Finally,several metrics were calculated to evaluate different threat detection approaches and attempted to answer four research questions mentioned above.

    Table 3.Overview of attack scenarios.

    Figure 2.The overview of our analysis framework.

    Table 4.Event collection in real-world endpoints.

    To conduct crosswise comparison and longitudinal assessment of diverse methods on consistent datasets,we built a series of datasets to carry out subsequent experiments.First of all,we captured OS log data given permission by volunteers in a real-world IT enterprise.We deployed log collection agents on 5 heavily used endpoints and transmitted log data to the ES server.To obtain enough representative system provenance data with diverse types of uses,the 5 endpoints we selected were used for different purposes in their daily work.For example,an executive manager who daily send and receive emails and edit documents,fnancial personnel who frequently operate Excel,and IT systems administrator who heavily access remote servers.After gathering over one week,we fnally constructed our benign dataset for further analysis.

    Besides the benign dataset we captured in a realworld environment mentioned above,we also considered construction of cyber threat dataset.To prepare malicious behavior dataset,we selected 6 typical cyber threat scenarios,including the following attack features:vulnerability exploitation,data exfltration,backdoor malware,phishing email,lateral movement,etc.Each scenario could have one or more attack features.Based upon our full knowledge of the cyber attack process,we manually collected the ground truth of these attack cases,so we could perform analysis with explicit interpretability.Considering that such attack cases may have unpredictable consequences on real-world IT systems,we simulated these attack scenarios in a virtual environment.We obtained malware samples and analysis reports from VirusTotal[20]and utilized them in the aforementioned attack scenarios,as well as the open-source penetration testing framework Metasploit[21],to perform vulnerabil-ity exploitation and C2.While simulating such attack cases,we adopted the consistent method and deployed the same agent as the collection of the benign dataset to capture the corresponding system provenance data,and analyzed it based on the ground truth to obtain correlated threat alerts that could identify these attacks.Table 3 details 6 types of attack scenarios and true threat events.Noting that the true alert denoted by a triad

    Table 5.Event data of attack cases.

    We deployed our analysis framework on a machine equipped with AMD Opertron?6136 CPU(10M Cache,16 Cores,2.4GHz)and 64GB of physical memory running Kali Linux OS.All modules in our analysis pipeline including provenance data preprocessing,causality graph generation,threat model training,and metrics assessment were totally deployed and conducted on this machine.

    3.2 Dataset

    Since the threat detection approaches we evaluated are all based on system provenance graph,we need to further generate the whole-system provenance graph after obtaining the benign and malicious system event log datasets detailed in§3.1.To better quantify the evaluation metrics,we generate provenance graphs for benign dataset and malicious dataset respectively.Table 4 summarizes the scale of the benign dataset.Raw Logs column indicates the number of system events and size of raw data.We collect a total of about 40GB of raw log data and have 46 million events in total.After generating whole-system provenance graphs,we can see the usage of storage space has reduced dramatically.Moreover,we adopt log reduction algorithms[22–24]to flter out irrelevant events for generating correlation graphs for further reducing the scale of the provenance graph without loss of semantics.Finally,we obtain the correlation graphs of 5 endpoints thatonly account for 51.84MB with about 90 thousand vertices and 255 thousand edges in total.

    Table 6.Comparison of detection accuracy.

    On the other hand,we obtain raw logs data from the replay process of 6 attack scenarios mentioned above and leverage the consistent algorithm to generate whole-system provenance graphs and corresponding correlation graphs.Table 5 shows the details of the number of events and the scale of correlation graphs.It is worth mentioning that the number of events generated in the 6 attack scenarios accounted for about 8.3‰of all benign data captured in a real-world environment,which is in line with our general expectations for the percentage of real-world cyber attacks.

    3.3 Detection Accuracy

    We blend the aforementioned benign dataset and the malicious dataset of each attack scenario to build 6 sets of data.Then we feed the dataset to each threat detection approach to threat analysis.It is worth mentioning that approaches A-4 and A-5 are not suitable for all attack scenarios.Since A-4 leverages the graph matching method,it needs to construct a query subgraph based on known threat intelligence.Among the 6 attack scenarios,only S-3 can obtain consistent threat intelligence for enough incidents exploiting CVE-2017-11882.In addition,because approach A-5 is mainly applied to service process,e.g.,Apache HTTP Server,FTP Service,etc.The characteristic of these services is that there is an event-handling loop during their execution.Therefore,using the method of tag propagation to limit the causal dependency of system events within an event-handling loop can mitigate the dependency explosion problem.To this end,S-4 and S-5 are suitable for the application of A-5,which has FTP service and RDP service respectively.Table 6 shows the detection accuracy of each method we evaluate.The indicator Critical Unit(CU)represents the key malicious events that need to be detected based on our comprehensive understanding of the ground truth,which are listed in detail in Table 3.All Unit(AU)denotes the number of alarms output by each threat detection method we evaluate.Due to the different detection granularity adopted by different detection approaches,AU is considered an abnormal system event in A-3 and A-5,suspicious path in A-1 and A-2,and anomaly subgraph in A-4.While True Unit(TU)indicates the number of true alarms,that is CUs detected by each approach.

    For each attack scenario,we marked the best approach with bold font in Table 6.Among them,A-2 gains the best results in three of the 6 scenarios,and also obtains better results in the other three scenarios.This is mainly because A-2 not only assigns an anomaly score to each event by constructing a reference model,but also refers to external threat intelligence,e.g.,malicious IP,malicious fle extensions,etc.,which undoubtedly improves the accuracy of the anomaly score of the event.We can also see that A-3 and A-4 do not achieve good results in all attack scenarios.For A-3,due to the use of single event(edge in graph)granularity as the alarm unit,this greatly weakens the ability to detect modern multi-stage attacks.As for A-4,as modern sophisticated attacks cannot have full knowledge in advance,the effect of detection methods based solely on threat intelligence is not ideal.As a particular approach,although A-5 is only applicable to S-4 and S-5,it can effectively output all CUs due to alleviation of the dependency explosion problem.Indeed,the shortcoming of A-5 is also obvious,that is it outputs too many AUs i.e.false alarms,thus it is diffcult to work in practical applications.

    3.4 Time Saved Conducting Investigation

    Since current cyber threat detection and investigation is still a manual or semi-automated labor-intensive task,an important indicator for evaluating cyber threat detection approaches is the time saved by the attack investigation.This includes not only the number of alarms output by the threat detection method but also whether the alarms are presented in a way that facilitates threat analysis.Since the methods evaluated in this paper are all based on the system provenance graph,all alarms are fed back to security analysts via graphs.This visualization greatly improves the effciency of the analyst’s correlation analysis.To facilitate the quantitative evaluation of diverse methods,we focus on general indicators such as alarm precision and recall rate to assess these approaches.

    Figure 3.Comparison of response time.

    Table 7 shows the performance of these methods we evaluate in 6 attack scenarios.As discussed in§3.3,Method A-2 achieves the best results in recall rates of all 5 approaches.Not only that,but also A-2 is the best among all evaluation methods in terms of precision rate.This is mainly because A-2 uses the causal path as the alarm unit,so it can capture more CUs with fewer alarms.Although A-1 also adopts a similar method to A-2,both the precision rate and the recall rate are slightly weaker than A-2.This may be due to the introduction of the Local Outlier Factor(LOF)anomaly detection algorithm to extract the abnormal path,which is sensitive to the homogeneity of captured system events.Noting that A-5 uses the single event as the alarm unit,so a large number of alarms appear during the detection process.We sort the number of the same alarms in ascending order and extract the top 5000 distinct alarms for analysis.Although A-5 achieves a 100%recall rate in the two applicable attack scenarios,the low F-measure makes this method impossible to use in practice.

    3.5 Runtime Performance

    To answer RQ3,we measure the runtime overhead of these approaches we evaluate for 6 attack scenarios if applicable.Figure 3 shows the comparison of the response time of different methods.We see that four approaches except A-5 can accomplish the steps includ-ing feature representation,graph embedding,graph query,and anomaly detection within 10 minutes.This is because although A-5 is an instrumentation-free method,to capture the event handling loop of the server application,a lot of pre-training work is still required,and this part of the work takes more than 10 minutes to complete.In fact,we spend 6 hours determining the event handling loop of a specifc version of the service program to obtain a better detection effect.In addition,we can see that the response time of A-1 is much higher than that of A-2,A-3,and A-4.This is mainly because A-1 needs to convert the system provenance graph from the directed graph(DG)to the directed acyclic graph(DAG)in order to adopt the shortest path algorithm between two vertices with lower time complexity in graph computing.This process consumes more time.A-4 has a similar response time to A-2 and A-3,but it spends time on generating query subgraphs based on threat intelligence,rather than the A-2 or A-3 anomaly detection stage.

    Table 7.Comparison of recall and precision rates,and F-measure.

    Table 8.Comparison of space overhead.

    3.6 Space Overhead

    To evaluate the storage space overhead of these approaches in the threat detection process,we record the size of the intermediate results generated by diverse methods at different stages in the experiment.Table 8 lists the space overhead of different methods.The values in the table are the averages of the results of the same method in all 6 attack scenarios.Since not every method has an intermediate output at all stages,we can see a big difference in the space usage of these methods.Method A-1 is the approach with the largest space utilization rate.The main reason is that in the process of converting DG to DAG,a large number of nodes and corresponding edges need to be split,which greatly expands the scale of the graph.A-2 and A-3 have similar space overhead.While A-4 and A-5 have very small space usage because they are not based on anomaly detection algorithms,so no additional reference models and feature representation are needed.

    IV.DISCUSSION AND LIMITATIONS

    In this section,we discuss the reasons for choosing these 5 provenance graph-based threat detection approaches for evaluation,and under which conditions they are worth applying.In addition,we discuss the threats to validity for discovering limitations of this paper.

    4.1 Approaches Selection

    As mentioned in§2.1,there are three main threat detection methods based on the provenance graph,namely outlier detection(aka anomaly detection),graph matching,and tag propagation.We choose A-1,A-2,and A-3 as typical anomaly detection-based methods for two main reasons:(1)these three methods are a series of continuous research work.Concretely,A-3 uses single event as the alarm unit,and A-2 further uses the causal path level as the alarm unit.While the latest method A-1 optimizes the causal path embedding method of A-2.Through the evaluation of three methods,we can discover the impact of subtle technical details on the threat detection results.(2)Other similar methods almost use the same technical architecture as these three methods,so the help for crosswise comparison of such methods is not signifcant.In addition,A-4 is a representative threat detection method based on graph matching.It generates a set of query subgraphs based on threat intelligence to identify whether there are known threats in the system provenance graph.A-5 is a method of tag propagation.By setting tags for system events in the same event handling loop,the problem of dependency explosion can be effectively alleviated.Choosing A-4 and A-5 can give us insight into the detection results and impact factors between different types of approaches.

    4.2 Approaches Applicability

    From our empirical evaluation,we can see that the approaches A-1,A-2,and A-3 can be applied to threat detection in a variety of attack scenarios.However,the evaluation results show that A-3 is unable to detect modern multi-stage cyber attacks due to the use of event-granularity alarms.In addition,compared with A-1,the approach A-2 has outstanding performance in both precision rate and recall rate.A-1 is more suitable for threat detection of homogeneous system events,e.g.specifc stealthy malware.As a graph matching method based on threat intelligence,A-4 relies more on the completeness of threat knowledge,so its ability to detect unknown threats is weak.A-5 is especially suitable for threat detection of server-side applications which receive users’requests and respond to them.

    4.3 Threats to Validity

    we discuss three threats that affect the validity of our evaluation.

    First,only three types of events are retained in our evaluation as mentioned in Table 1.Without loss of generality,it still works for new other event types.Since these methods we evaluate use the same dataset and provenance graph generation algorithm,this will not affect the evaluation results.

    Second,our dataset does not seem to be too large.It would not affect the comparison of different threat detection approaches.Instead,it would be easier to fnd what factors cause these diversities.

    Third,the virtual environment that we used to collect the malicious dataset might be slightly different from the real-world environment.To eliminate this deviation,we(1)choose malware that is not sensitive to the environment,and(2)ignore system events that are used for virtual machine control and management.In other words,this preprocessing could prevent the threat detection algorithm from overftting when training the model due to environmental differences.

    V.RELATED WORK

    DARPA has launched the Transparent Computing(TC)Project in 2015,to make new efforts toward threat analysis[25].The TC project attempts to fnd a high-fdelity and visualized method to abstract the interaction between components in an opaque system,to implement more effective security policies on distributed systems or multi-component systems.The high complexity of modern information systems obscures the connections between securityrelated events.Therefore,it is diffcult to fnd advanced attack patterns such as APT with existing methods.The TC project develops the ability to disseminate security-related information,trace the full knowledge of the provenance of events,and ensure that the interaction of the components is consistent with the security policy.

    With the funding of the TC project,besides the 5 representative approaches evaluated in this paper,the security community has proposed a large body of research work for cyber threat detection[5,26–29]including our previous work CTScopy[30].SWIFT[31]proposed a real-time threat detection technique to improve the throughput of causal tracing.This method designed a memory database to reduce the disk operation time as much as possible.Pagoda[32]introduced a hybrid approach that takes into account the anomaly degree of both a single provenance path and the whole provenance graph.Its subsequence work PGaussian[33]presented a method leveraging gaussian distribution scheme to detect variants leveraging realtime memory database for improving performance.

    Cyber threat investigation and attack reconstruction are another application of system provenance graphs.Given the true alarms,attack reconstruction can help security analysts fully characterize the entire process of cyber attacks[34–36].The latest development in this aspect is ATLAS[37],a framework for building end-to-end security incidents from existing audit logs.It uses a combination of causality analysis,NLP,and machine learning techniques to model and identifes different attack patterns through sequence-based analysis.ATLAS can recover the key attack steps that constitute an attack story with high accuracy and effciency.

    Leveraging system provenance graph for large-scale malware analysis is a new effort.Our previous work RansomLens[38]proposed a novel approach to analyze the inter-family and intra-family behaviors of ransomware based on the provenance graph of running instances of ransomware.It maps the behavioral characteristics of the ransomware to the indicators of the corresponding provenance graph,e.g.identifying the key encryption process of the ransomware through the closeness centrality(CC)indicator of the graph.This graph computing-based approach can effectively conduct large-scale malware analysis.

    VI.CONCLUSION

    In this paper,we implement an analysis framework for empirically evaluating provenance graph-based threat detection approaches.To evaluate diverse kinds of threat detection methods,we collect benign data from the real-world environment,and malicious dataset via simulating attack scenarios in an isolated virtual environment.We perform crosswise comparison and longitudinal assessment for fve state-of-the-art approaches,and the evaluation results are of great signifcance for understanding provenance graph-based threat detection approaches.

    ACKNOWLEDGMENT

    The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.This work is supported by National Natural Science Foundation of China(No.U1736218)and National Key R&D Program of China(No.2018YFB0804704).The analysis infrastructure and dataset of this work are partially supported by CNCERT/CC.

    亚洲av第一区精品v没综合| 久久中文看片网| 久久精品人妻少妇| 变态另类成人亚洲欧美熟女| 啦啦啦韩国在线观看视频| 法律面前人人平等表现在哪些方面| 国产成人一区二区三区免费视频网站| 18禁裸乳无遮挡免费网站照片| 国产精品久久久久久人妻精品电影| АⅤ资源中文在线天堂| 精品乱码久久久久久99久播| 美女大奶头视频| 精品电影一区二区在线| 两个人的视频大全免费| 国产一区二区三区视频了| 亚洲 欧美 日韩 在线 免费| av天堂中文字幕网| 老熟妇乱子伦视频在线观看| www日本在线高清视频| 成人永久免费在线观看视频| 观看免费一级毛片| 国产精品 欧美亚洲| 国产精品久久电影中文字幕| 中出人妻视频一区二区| 久久久久国产一级毛片高清牌| 欧美3d第一页| 夜夜夜夜夜久久久久| e午夜精品久久久久久久| 欧美3d第一页| 欧美一级毛片孕妇| www.熟女人妻精品国产| 亚洲男人的天堂狠狠| 午夜福利成人在线免费观看| 亚洲欧美精品综合久久99| 最新在线观看一区二区三区| 亚洲欧美激情综合另类| 欧美日韩一级在线毛片| bbb黄色大片| 精品日产1卡2卡| 国产人伦9x9x在线观看| 日韩欧美国产在线观看| 91老司机精品| 老司机深夜福利视频在线观看| 香蕉久久夜色| 一区二区三区激情视频| ponron亚洲| 日韩人妻高清精品专区| 又粗又爽又猛毛片免费看| 午夜影院日韩av| 久久久国产欧美日韩av| ponron亚洲| 日韩精品青青久久久久久| 亚洲乱码一区二区免费版| 免费看a级黄色片| 在线视频色国产色| 美女免费视频网站| www日本黄色视频网| 国产免费av片在线观看野外av| 亚洲片人在线观看| 国产又色又爽无遮挡免费看| 男女下面进入的视频免费午夜| 久久国产乱子伦精品免费另类| 亚洲欧美日韩无卡精品| 日本五十路高清| 天天躁狠狠躁夜夜躁狠狠躁| 欧美av亚洲av综合av国产av| 美女午夜性视频免费| 久久精品国产亚洲av香蕉五月| 一级a爱片免费观看的视频| www日本黄色视频网| 色综合亚洲欧美另类图片| 精品乱码久久久久久99久播| 欧美黄色片欧美黄色片| 97超视频在线观看视频| 亚洲激情在线av| 97超视频在线观看视频| 国产伦人伦偷精品视频| 免费大片18禁| 制服丝袜大香蕉在线| 嫩草影院入口| 高清毛片免费观看视频网站| 久久午夜亚洲精品久久| 久久久色成人| 欧美日韩一级在线毛片| 久久草成人影院| 国产精品永久免费网站| 亚洲av成人精品一区久久| 人妻丰满熟妇av一区二区三区| 午夜精品一区二区三区免费看| 91九色精品人成在线观看| 国产成人av激情在线播放| 久久久久精品国产欧美久久久| 色综合欧美亚洲国产小说| 国内久久婷婷六月综合欲色啪| 成人亚洲精品av一区二区| 亚洲精品乱码久久久v下载方式 | 亚洲真实伦在线观看| 亚洲av成人不卡在线观看播放网| 国产三级在线视频| 国产高清激情床上av| www.999成人在线观看| 亚洲无线在线观看| 精品久久久久久久毛片微露脸| 精品久久久久久久毛片微露脸| 51午夜福利影视在线观看| 国产精品久久视频播放| 性色avwww在线观看| 一本久久中文字幕| 国产精品久久视频播放| 18禁裸乳无遮挡免费网站照片| 亚洲色图 男人天堂 中文字幕| 国产精品美女特级片免费视频播放器 | 免费在线观看成人毛片| 国内精品久久久久久久电影| 午夜激情福利司机影院| 欧美一级毛片孕妇| 99热这里只有是精品50| 少妇的逼水好多| 老司机深夜福利视频在线观看| 韩国av一区二区三区四区| 亚洲最大成人中文| 天天一区二区日本电影三级| 国产亚洲精品久久久久久毛片| 国产精品99久久99久久久不卡| 身体一侧抽搐| 欧美又色又爽又黄视频| 九九久久精品国产亚洲av麻豆 | 亚洲av日韩精品久久久久久密| 俄罗斯特黄特色一大片| 欧美成人性av电影在线观看| 国产精品久久久久久人妻精品电影| 后天国语完整版免费观看| 亚洲精品456在线播放app | 蜜桃久久精品国产亚洲av| 欧美绝顶高潮抽搐喷水| 国产爱豆传媒在线观看| 国产精品一区二区三区四区久久| 综合色av麻豆| 69av精品久久久久久| 久99久视频精品免费| av片东京热男人的天堂| 狂野欧美激情性xxxx| 久久伊人香网站| 一区二区三区国产精品乱码| 在线国产一区二区在线| 老司机深夜福利视频在线观看| 又紧又爽又黄一区二区| 在线观看66精品国产| 日韩免费av在线播放| 18禁黄网站禁片免费观看直播| 美女黄网站色视频| 久久久久久久午夜电影| 国产精品自产拍在线观看55亚洲| 久久亚洲真实| 在线观看免费午夜福利视频| 夜夜夜夜夜久久久久| 高清在线国产一区| 国产av麻豆久久久久久久| 欧美高清成人免费视频www| 一二三四在线观看免费中文在| 每晚都被弄得嗷嗷叫到高潮| 999久久久国产精品视频| 午夜影院日韩av| 国产91精品成人一区二区三区| 亚洲中文av在线| 欧美在线一区亚洲| 99精品久久久久人妻精品| 久久久久国产一级毛片高清牌| 亚洲国产精品久久男人天堂| 亚洲国产欧美网| 午夜两性在线视频| 成人三级黄色视频| 国产成年人精品一区二区| 亚洲欧美日韩卡通动漫| 欧美日韩福利视频一区二区| 一卡2卡三卡四卡精品乱码亚洲| 一区二区三区国产精品乱码| 亚洲成人免费电影在线观看| 欧美在线黄色| 亚洲九九香蕉| 女警被强在线播放| 成人欧美大片| 全区人妻精品视频| 在线永久观看黄色视频| 18禁美女被吸乳视频| 免费在线观看成人毛片| 国产精品电影一区二区三区| 精品国产超薄肉色丝袜足j| 国产免费av片在线观看野外av| 男女之事视频高清在线观看| 亚洲欧美激情综合另类| 国产av麻豆久久久久久久| 日本黄大片高清| 91麻豆精品激情在线观看国产| 亚洲精华国产精华精| 亚洲一区高清亚洲精品| 99久久99久久久精品蜜桃| av天堂在线播放| 欧美性猛交╳xxx乱大交人| 午夜激情福利司机影院| av福利片在线观看| 琪琪午夜伦伦电影理论片6080| 校园春色视频在线观看| 国产三级中文精品| 亚洲精品久久国产高清桃花| 国产午夜精品论理片| 久久精品aⅴ一区二区三区四区| 成人性生交大片免费视频hd| 天天一区二区日本电影三级| 成年女人永久免费观看视频| 亚洲第一电影网av| 欧美日本亚洲视频在线播放| 亚洲成av人片免费观看| 欧美激情久久久久久爽电影| 亚洲无线在线观看| 国产又黄又爽又无遮挡在线| 亚洲成人精品中文字幕电影| 后天国语完整版免费观看| 国产精品乱码一区二三区的特点| 国产三级黄色录像| 亚洲欧洲精品一区二区精品久久久| 日韩精品青青久久久久久| 欧美xxxx黑人xx丫x性爽| 人人妻人人看人人澡| 少妇丰满av| 国产精品美女特级片免费视频播放器 | 村上凉子中文字幕在线| 桃红色精品国产亚洲av| 免费看光身美女| 十八禁网站免费在线| 婷婷丁香在线五月| 国产午夜福利久久久久久| 精品免费久久久久久久清纯| 啦啦啦韩国在线观看视频| 国产主播在线观看一区二区| 非洲黑人性xxxx精品又粗又长| 免费无遮挡裸体视频| a级毛片a级免费在线| www.熟女人妻精品国产| 国产成人系列免费观看| 无人区码免费观看不卡| 动漫黄色视频在线观看| 岛国在线免费视频观看| 美女被艹到高潮喷水动态| 男女下面进入的视频免费午夜| 国产真实乱freesex| 日韩精品中文字幕看吧| 视频区欧美日本亚洲| 中文字幕最新亚洲高清| 午夜福利欧美成人| av片东京热男人的天堂| 一区二区三区高清视频在线| 这个男人来自地球电影免费观看| 国内精品一区二区在线观看| 成在线人永久免费视频| 日日夜夜操网爽| 国产一区二区在线观看日韩 | 久久久久国产一级毛片高清牌| 一进一出抽搐gif免费好疼| 亚洲精华国产精华精| 亚洲无线观看免费| 琪琪午夜伦伦电影理论片6080| 中文在线观看免费www的网站| 亚洲国产精品999在线| 可以在线观看的亚洲视频| 一个人看的www免费观看视频| 露出奶头的视频| 国产高清三级在线| 男女做爰动态图高潮gif福利片| 午夜激情欧美在线| 99久久久亚洲精品蜜臀av| 久久天躁狠狠躁夜夜2o2o| 亚洲成av人片在线播放无| 十八禁网站免费在线| 久久伊人香网站| 色在线成人网| 在线免费观看不下载黄p国产 | 日本黄色片子视频| 91字幕亚洲| 俺也久久电影网| 国产精品国产高清国产av| 天天添夜夜摸| 真人做人爱边吃奶动态| 国产av不卡久久| 天堂影院成人在线观看| av欧美777| 最新在线观看一区二区三区| 一区二区三区高清视频在线| 香蕉国产在线看| 亚洲精品一卡2卡三卡4卡5卡| 观看美女的网站| 一区二区三区国产精品乱码| 哪里可以看免费的av片| 91老司机精品| 免费电影在线观看免费观看| 国产精品 欧美亚洲| 亚洲国产精品999在线| 精品无人区乱码1区二区| 亚洲一区二区三区色噜噜| 99久久无色码亚洲精品果冻| 免费看光身美女| 听说在线观看完整版免费高清| 脱女人内裤的视频| 亚洲精品美女久久久久99蜜臀| 国产av一区在线观看免费| 久久国产乱子伦精品免费另类| 三级毛片av免费| 日本黄大片高清| www.www免费av| 成年版毛片免费区| 亚洲aⅴ乱码一区二区在线播放| 国产亚洲精品一区二区www| АⅤ资源中文在线天堂| 啦啦啦观看免费观看视频高清| 色吧在线观看| av黄色大香蕉| 久久婷婷人人爽人人干人人爱| 91麻豆av在线| 精华霜和精华液先用哪个| 国产视频内射| 男女午夜视频在线观看| 夜夜夜夜夜久久久久| 日韩精品青青久久久久久| 成人av在线播放网站| 欧美日韩黄片免| 桃红色精品国产亚洲av| 一区二区三区激情视频| 男女视频在线观看网站免费| 国产精品野战在线观看| 国内揄拍国产精品人妻在线| 综合色av麻豆| 亚洲无线在线观看| 色视频www国产| 精品久久久久久久人妻蜜臀av| 男人舔奶头视频| 国产精品九九99| 女人被狂操c到高潮| h日本视频在线播放| 哪里可以看免费的av片| 精品无人区乱码1区二区| 手机成人av网站| www.999成人在线观看| 成年女人毛片免费观看观看9| 女同久久另类99精品国产91| 国产成人福利小说| 欧美一级毛片孕妇| 12—13女人毛片做爰片一| 国产黄色小视频在线观看| 精品一区二区三区av网在线观看| 91字幕亚洲| 黄频高清免费视频| 天堂网av新在线| 色噜噜av男人的天堂激情| 99久国产av精品| 97人妻精品一区二区三区麻豆| 亚洲成a人片在线一区二区| 亚洲精品在线观看二区| e午夜精品久久久久久久| 精品人妻1区二区| 在线看三级毛片| 亚洲精品在线观看二区| 欧美色欧美亚洲另类二区| 日韩精品青青久久久久久| 国产麻豆成人av免费视频| 日韩人妻高清精品专区| aaaaa片日本免费| 亚洲真实伦在线观看| 97超级碰碰碰精品色视频在线观看| 国产精品影院久久| 欧美黄色淫秽网站| 日韩 欧美 亚洲 中文字幕| 99久国产av精品| 国产一区二区在线观看日韩 | 一个人观看的视频www高清免费观看 | 国产高清videossex| 美女大奶头视频| 国产v大片淫在线免费观看| 无遮挡黄片免费观看| 久久精品国产99精品国产亚洲性色| 免费看a级黄色片| 日本黄色片子视频| 99re在线观看精品视频| 日本三级黄在线观看| 草草在线视频免费看| svipshipincom国产片| 国产精品久久久人人做人人爽| 国产高清videossex| 国产精品免费一区二区三区在线| 看免费av毛片| 90打野战视频偷拍视频| 熟妇人妻久久中文字幕3abv| 欧美在线一区亚洲| 中文亚洲av片在线观看爽| 亚洲成av人片免费观看| 大型黄色视频在线免费观看| aaaaa片日本免费| 久久久国产欧美日韩av| 国产激情久久老熟女| 在线永久观看黄色视频| 午夜精品一区二区三区免费看| 99在线人妻在线中文字幕| 日日摸夜夜添夜夜添小说| 久久精品综合一区二区三区| 一本综合久久免费| 色播亚洲综合网| 亚洲欧美精品综合一区二区三区| 久久性视频一级片| 精品电影一区二区在线| 亚洲一区高清亚洲精品| 亚洲片人在线观看| 日本一本二区三区精品| 色综合站精品国产| 免费在线观看视频国产中文字幕亚洲| 亚洲av熟女| 黄色成人免费大全| tocl精华| 日本五十路高清| 老司机午夜福利在线观看视频| 欧美在线黄色| 国产综合懂色| 琪琪午夜伦伦电影理论片6080| 亚洲国产日韩欧美精品在线观看 | 中出人妻视频一区二区| 丰满的人妻完整版| 一级毛片女人18水好多| av在线天堂中文字幕| 在线十欧美十亚洲十日本专区| 99久久无色码亚洲精品果冻| 午夜福利在线观看免费完整高清在 | 91麻豆精品激情在线观看国产| 两个人看的免费小视频| 亚洲无线在线观看| 欧美日韩瑟瑟在线播放| 日本一二三区视频观看| www.自偷自拍.com| 午夜福利成人在线免费观看| 丰满人妻一区二区三区视频av | 老司机深夜福利视频在线观看| 国产精品久久久久久人妻精品电影| 黑人巨大精品欧美一区二区mp4| 精品欧美国产一区二区三| 午夜福利高清视频| 精品久久蜜臀av无| 久久精品国产清高在天天线| 国产激情偷乱视频一区二区| 精品免费久久久久久久清纯| 国产亚洲精品久久久久久毛片| 午夜精品久久久久久毛片777| 日本免费一区二区三区高清不卡| 又爽又黄无遮挡网站| 国产主播在线观看一区二区| 国内精品久久久久精免费| 亚洲无线在线观看| 国产毛片a区久久久久| 嫁个100分男人电影在线观看| 老熟妇仑乱视频hdxx| av片东京热男人的天堂| 久久婷婷人人爽人人干人人爱| 淫妇啪啪啪对白视频| 成人特级av手机在线观看| 不卡av一区二区三区| 欧美xxxx黑人xx丫x性爽| 我的老师免费观看完整版| 在线看三级毛片| av欧美777| 精品一区二区三区av网在线观看| 天天添夜夜摸| 国产精品一区二区精品视频观看| 麻豆成人午夜福利视频| 美女大奶头视频| 中文字幕最新亚洲高清| 成人特级av手机在线观看| 亚洲最大成人中文| 久久九九热精品免费| 国产三级中文精品| 蜜桃久久精品国产亚洲av| 亚洲国产欧洲综合997久久,| 中文资源天堂在线| 国产精品久久久久久人妻精品电影| 精品国产超薄肉色丝袜足j| 在线免费观看不下载黄p国产 | 欧美最黄视频在线播放免费| 午夜亚洲福利在线播放| 熟女电影av网| x7x7x7水蜜桃| 国产蜜桃级精品一区二区三区| 欧美最黄视频在线播放免费| 51午夜福利影视在线观看| 亚洲中文字幕日韩| 97超级碰碰碰精品色视频在线观看| 精品国产三级普通话版| 美女被艹到高潮喷水动态| 51午夜福利影视在线观看| 亚洲中文字幕日韩| 两人在一起打扑克的视频| 国产精品av视频在线免费观看| 免费在线观看日本一区| 日日干狠狠操夜夜爽| 亚洲精品在线美女| 久久久国产成人精品二区| 国产91精品成人一区二区三区| 中文字幕av在线有码专区| 91久久精品国产一区二区成人 | 在线视频色国产色| 国产在线精品亚洲第一网站| 久久中文字幕人妻熟女| 亚洲成人免费电影在线观看| 日本撒尿小便嘘嘘汇集6| 黄色女人牲交| 久久热在线av| 国产精品一区二区三区四区久久| 高潮久久久久久久久久久不卡| 国产高清视频在线观看网站| 国产精品一区二区免费欧美| 宅男免费午夜| 老司机福利观看| 巨乳人妻的诱惑在线观看| 少妇的丰满在线观看| 少妇人妻一区二区三区视频| 欧美黄色淫秽网站| 村上凉子中文字幕在线| 美女高潮的动态| 欧美成人一区二区免费高清观看 | 欧美在线一区亚洲| 又黄又爽又免费观看的视频| 久久中文字幕一级| 又黄又粗又硬又大视频| 久久中文字幕人妻熟女| 91九色精品人成在线观看| 欧美性猛交╳xxx乱大交人| 欧美日本视频| 极品教师在线免费播放| 一本综合久久免费| 精品国产乱码久久久久久男人| 搞女人的毛片| 最近最新中文字幕大全免费视频| 日韩精品中文字幕看吧| 免费搜索国产男女视频| 99视频精品全部免费 在线 | 2021天堂中文幕一二区在线观| 久久久久精品国产欧美久久久| or卡值多少钱| 99视频精品全部免费 在线 | 宅男免费午夜| 国产精品99久久久久久久久| 精品欧美国产一区二区三| 五月伊人婷婷丁香| 免费在线观看日本一区| 国产精品久久久久久人妻精品电影| 日本免费一区二区三区高清不卡| 国产久久久一区二区三区| a级毛片a级免费在线| 日本成人三级电影网站| 两人在一起打扑克的视频| 欧美黄色片欧美黄色片| 少妇熟女aⅴ在线视频| 麻豆成人午夜福利视频| 国产高清激情床上av| 亚洲国产欧美网| 黄片大片在线免费观看| 欧美av亚洲av综合av国产av| 啦啦啦韩国在线观看视频| 99久久无色码亚洲精品果冻| 国产精品久久久久久亚洲av鲁大| 中文在线观看免费www的网站| 免费大片18禁| 欧美日韩黄片免| 色av中文字幕| 色综合站精品国产| 中文亚洲av片在线观看爽| 国产单亲对白刺激| 国产成人福利小说| 又紧又爽又黄一区二区| 首页视频小说图片口味搜索| АⅤ资源中文在线天堂| 国语自产精品视频在线第100页| 亚洲人成伊人成综合网2020| 欧美黄色片欧美黄色片| 欧美日韩瑟瑟在线播放| 亚洲人与动物交配视频| 色吧在线观看| 欧美日韩瑟瑟在线播放| 国产成人av教育| 国产欧美日韩一区二区三| 无限看片的www在线观看| 午夜精品久久久久久毛片777| 国产精品av视频在线免费观看| 国产亚洲精品av在线| 毛片女人毛片| 一区福利在线观看| 国产亚洲精品综合一区在线观看| 国产亚洲精品久久久com| 五月伊人婷婷丁香| 国产成人精品久久二区二区免费| 男人的好看免费观看在线视频| 美女免费视频网站| 亚洲中文日韩欧美视频| 国产亚洲av嫩草精品影院| 午夜福利欧美成人| 黑人操中国人逼视频| 午夜精品在线福利| 男女做爰动态图高潮gif福利片| 久久久久免费精品人妻一区二区| 好男人在线观看高清免费视频| 草草在线视频免费看| 欧美乱色亚洲激情| 亚洲人成电影免费在线| 国产精品一及| 在线十欧美十亚洲十日本专区| 三级毛片av免费| 欧美黑人欧美精品刺激| 亚洲色图av天堂| 亚洲一区高清亚洲精品| 成年女人永久免费观看视频| 日本黄色视频三级网站网址|