Proceedings:
No. 17: IAAI-21, EAAI-21, AAAI-21 Special Programs and Special Track
Volume
Issue:
Proceedings of the AAAI Conference on Artificial Intelligence, 35
Track:
IAAI Technical Track on Emerging Applications of AI
Downloads:
Abstract:
We present a novel AI-based methodology that identifies phases of a host-level cyber attack simply from system call logs. System calls emanating from cyber attacks on hosts such as honey pots are often recorded in audit logs. Our methodology first involves efficiently loading, caching, processing, and querying system events contained in audit logs in support of computer forensics. Output of queries remains at the system call level and is difficult to process. The next step is to infer a sequence of abstracted actions, which we colloquially call a storyline, from the system calls given as observations to a latent-state probabilistic model. These storylines are then accurately identified with class labels using a learned classifier. We qualitatively and quantitatively evaluate methods and models for each step of the methodology using 114 different attack phases collected by logging the attacks of a red team on a server, on some likely benign sequences containing regular user activities, and on traces from a recent DARPA project. The resulting end-to-end system, which we call Cyberian, identifies the attack phases with a high level of accuracy illustrating the benefit that this machine learning-based methodology brings to security forensics.
DOI:
10.1609/aaai.v35i17.17786
AAAI
Proceedings of the AAAI Conference on Artificial Intelligence, 35