期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
CAPT:Context-Aware Provenance Tracing for Attack Investigation
1
作者 Cheng Tan Lei Zhao +2 位作者 Weijie Liu Lai Xu Lina Wang 《China Communications》 SCIE CSCD 2018年第2期153-169,共17页
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ... APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%. 展开更多
关键词 attack investigation provenance tracing CONTEXT-AWARE virtualization technol-ogies APT attacks panoramic view
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部