Abstract

Several advanced cyber attacks adopt the technique of “pivoting” through which attackers create a command propagation tunnel through two or more hosts in order to reach their final target. Identifying such malicious activities is one of the most tough research problems because of several challenges: command propagation is a rare event that cannot be detected through signatures, the huge amount of internal communications facilitates attackers evasion, timely pivoting discovery is computationally demanding. This paper describes the first pivoting detection algorithm that is based on network flows analyses, does not rely on any a-priori assumption on protocols and hosts, and leverages an original problem formalization in terms of temporal graph analytics. We also introduce a prioritization algorithm that ranks the detected paths on the basis of a threat score thus letting security analysts investigate just the most suspicious pivoting tunnels. Feasibility and effectiveness of our proposal are assessed through a broad set of experiments that demonstrate its higher accuracy and performance against related algorithms.

Highlights

  • Defending large enterprise systems is an increasingly challenging task

  • We initially propose an original formalization of the pivoting detection problem into the temporal graph analytics domain, and we present a pivoting detection algorithm that identifies pivoting tunnels through efficient network flow analyses that do not require any a-priori assumption about involved protocols and hosts

  • To the best of our knowledge, this paper presents the first algorithms for detection and threat prioritization of malicious pivoting activities: our proposal relies on the analysis of network flows, does not make assumptions about involved protocols and hosts, and is based on an original formulation of the pivoting detection problem in the temporal graph analytics domain

Read more

Summary

INTRODUCTION

Defending large enterprise systems is an increasingly challenging task. Modern attacks may combine social engineering strategies with malware to exploit software vulnerabilities, allowing attackers to find their ways into the network. Attackers typically begin by compromising any vulnerable internal host and try to reach the most valuable targets by moving host-tohost laterally and deeper into the enterprise network To this purpose, attackers are increasingly adopting the so called pivoting technique [2] in which a command propagation tunnel is created through one or more compromised internal host called pivoters. Among the most recent cases at the time of writing, we can cite the Archimedes tool [7] that leverages pivoting to reach the LAN of target hosts, passively gathers To address these issues, we propose the first algorithm for detection and threat prioritization of pivoting that analyzes internal network flows and does not rely on any a-priori knowledge about the adopted protocols and compromised hosts, which are instead needed by related solutions making them impractical for real contexts.

RELATED WORK
PIVOTING
Pivoting detection as a temporal graph problem
Algorithm for pivoting detection
Computational complexity
THREAT PRIORITIZATION
EXPERIMENTAL EVALUATION
Pivoting detection and prioritization
Evasion techniques
Comparison with other detection algorithms
Execution times
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call