Provenance graph generation for intrusion detection
In today’s rapidly evolving threat landscape, the demand for robust defense mechanisms against zero-day attacks and other unforeseeable threats is escalating. As threat actors continually innovate, traditional security approaches struggle to keep pace, necessitating the exploration of novel strategi...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/175398 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-175398 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1753982024-04-26T15:45:12Z Provenance graph generation for intrusion detection Lim, Janesse Ziyi Ke Yiping, Kelly School of Computer Science and Engineering ypke@ntu.edu.sg Computer and Information Science Provenance graph Intrusion detection In today’s rapidly evolving threat landscape, the demand for robust defense mechanisms against zero-day attacks and other unforeseeable threats is escalating. As threat actors continually innovate, traditional security approaches struggle to keep pace, necessitating the exploration of novel strategies. Recent studies have highlighted the potential of provenance graphs in intrusion detection, showcasing their ability to achieve higher detection accuracy and lower false alarm rates compared to conventional system-call based methods. In this study, we aim to validate these findings by generating our own benign and malicious user scenarios. Leveraging the CamFlow provenance capture system, we will set up security-critical applications, design diverse intrusion scenarios, and simulate attacks. Subsequently, we will generate authentic provenance data for both benign and malicious cases, using them to evaluate state-of-the-art graph-based models. Performance assessment metrics such as detection rate, false alarm rate, detection time, and storage overhead will be employed to gauge the quality of the models. Through this investigation, we seek to contribute to the advancement of intrusion detection methodologies and enhance our understanding of provenance-based defense mechanisms. Bachelor's degree 2024-04-24T01:47:02Z 2024-04-24T01:47:02Z 2024 Final Year Project (FYP) Lim, J. Z. (2024). Provenance graph generation for intrusion detection. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/175398 https://hdl.handle.net/10356/175398 en SCSE23-0398 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computer and Information Science Provenance graph Intrusion detection |
spellingShingle |
Computer and Information Science Provenance graph Intrusion detection Lim, Janesse Ziyi Provenance graph generation for intrusion detection |
description |
In today’s rapidly evolving threat landscape, the demand for robust defense mechanisms against zero-day attacks and other unforeseeable threats is escalating. As threat actors continually innovate, traditional security approaches struggle to keep pace, necessitating the exploration of novel strategies. Recent studies have highlighted the potential of provenance graphs in intrusion detection, showcasing their ability to achieve higher detection accuracy and lower false alarm rates compared to conventional system-call based methods. In this study, we aim to validate these findings by generating our own benign and malicious user scenarios. Leveraging the CamFlow provenance capture system, we will set up security-critical applications, design diverse intrusion scenarios, and simulate attacks. Subsequently, we will generate authentic provenance data for both benign and malicious cases, using them to evaluate state-of-the-art graph-based models. Performance assessment metrics such as detection rate, false alarm rate, detection time, and storage overhead will be employed to gauge the quality of the models. Through this investigation, we seek to contribute to the advancement of intrusion detection methodologies and enhance our understanding of provenance-based defense mechanisms. |
author2 |
Ke Yiping, Kelly |
author_facet |
Ke Yiping, Kelly Lim, Janesse Ziyi |
format |
Final Year Project |
author |
Lim, Janesse Ziyi |
author_sort |
Lim, Janesse Ziyi |
title |
Provenance graph generation for intrusion detection |
title_short |
Provenance graph generation for intrusion detection |
title_full |
Provenance graph generation for intrusion detection |
title_fullStr |
Provenance graph generation for intrusion detection |
title_full_unstemmed |
Provenance graph generation for intrusion detection |
title_sort |
provenance graph generation for intrusion detection |
publisher |
Nanyang Technological University |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/175398 |
_version_ |
1814047395731734528 |