Provenance graph generation for intrusion detection

Intrusion Detection System (IDS) is a monitoring system that passively listens to a network, detecting and generating alerts for suspicious activities. However, detection of such activities has become increasingly challenging due to sophisticated evasion techniques deployed by present-day malware...

Full description

Saved in:
Bibliographic Details
Main Author: Chong, Wai Mun
Other Authors: Ke Yiping, Kelly
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/171978
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-171978
record_format dspace
spelling sg-ntu-dr.10356-1719782023-11-24T15:37:13Z Provenance graph generation for intrusion detection Chong, Wai Mun Ke Yiping, Kelly School of Computer Science and Engineering ypke@ntu.edu.sg Engineering::Computer science and engineering Intrusion Detection System (IDS) is a monitoring system that passively listens to a network, detecting and generating alerts for suspicious activities. However, detection of such activities has become increasingly challenging due to sophisticated evasion techniques deployed by present-day malware and Advanced Persistent Threats (APTs). Consequently, commercial IDSs may fail to detect intrusions for extended periods, leading to substantial financial losses and data breaches for organizations. Provenance graphs are directed graphs that documents the lineage and history of data, and their associated activities. In a host system, provenance graph delivers a forensic aspect to intrusion detection, capturing the descendants and activities from a single malicious entity. By capturing intricate data flows and system objects, provenance graphs have the potential to better protect systems from emerging cyber threats. This project embarks on the exploration of provenance graphs to enhance intrusion detection capabilities. It will also generate provenance datasets from benign and malicious activities, and proposing graph analysis algorithms for intrusion detection. Bachelor of Engineering (Computer Science) 2023-11-20T02:46:42Z 2023-11-20T02:46:42Z 2023 Final Year Project (FYP) Chong, W. M. (2023). Provenance graph generation for intrusion detection. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/171978 https://hdl.handle.net/10356/171978 en SCSE22-0931 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Chong, Wai Mun
Provenance graph generation for intrusion detection
description Intrusion Detection System (IDS) is a monitoring system that passively listens to a network, detecting and generating alerts for suspicious activities. However, detection of such activities has become increasingly challenging due to sophisticated evasion techniques deployed by present-day malware and Advanced Persistent Threats (APTs). Consequently, commercial IDSs may fail to detect intrusions for extended periods, leading to substantial financial losses and data breaches for organizations. Provenance graphs are directed graphs that documents the lineage and history of data, and their associated activities. In a host system, provenance graph delivers a forensic aspect to intrusion detection, capturing the descendants and activities from a single malicious entity. By capturing intricate data flows and system objects, provenance graphs have the potential to better protect systems from emerging cyber threats. This project embarks on the exploration of provenance graphs to enhance intrusion detection capabilities. It will also generate provenance datasets from benign and malicious activities, and proposing graph analysis algorithms for intrusion detection.
author2 Ke Yiping, Kelly
author_facet Ke Yiping, Kelly
Chong, Wai Mun
format Final Year Project
author Chong, Wai Mun
author_sort Chong, Wai Mun
title Provenance graph generation for intrusion detection
title_short Provenance graph generation for intrusion detection
title_full Provenance graph generation for intrusion detection
title_fullStr Provenance graph generation for intrusion detection
title_full_unstemmed Provenance graph generation for intrusion detection
title_sort provenance graph generation for intrusion detection
publisher Nanyang Technological University
publishDate 2023
url https://hdl.handle.net/10356/171978
_version_ 1783955543603281920