Next Article in Journal
UWB/Binocular VO Fusion Algorithm Based on Adaptive Kalman Filter
Next Article in Special Issue
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Previous Article in Journal
Empirical Formulas for Estimating Backscattering and Absorption Coefficients in Complex Waters from Remote-Sensing Reflectance Spectra and Examples of Their Application
Previous Article in Special Issue
Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation

1
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
2
The Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Submission received: 23 July 2019 / Revised: 28 August 2019 / Accepted: 16 September 2019 / Published: 19 September 2019
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)

Abstract

:
With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate.

1. Introduction

With the rapid advancement of the Internet of Things (IoT) infrastructure and the widely emerging networking applications, IoT security management has faced several significant challenges [1]: (a) Invisibility: it is hard to convince users to keep the software updated in IoT equipment that stops looking like traditional computers; (b) Lifetimes: since IoT devices will likely live much longer than traditional computers, unpatched software will persist much longer in IoT devices; (c) Patchability: as long-term communications were required between remote IoT devices and public networking servers, updating patches became harder than conventional information systems; (d) Consequences of Compromise: the intimate connection of IoT devices to physical infrastructure will increase the damage from successful compromise. As the above challenges, IoT systems have performed vulnerability with complexity topological structure. To cope with these increasingly complicated and potential security threats, various detection techniques have been put forward, such as the vulnerability detection technology, malicious code detection method, intrusion detection system, trying to recognize the security issues existing in the IoT systems [2,3,4,5,6]. However, the biggest shortcoming of these methods is that they cannot provide real-time recognition of the real threats from a comprehensive scope, which limits the ability of IoT security administrators to make responsive decisions.
Recently, to solve this problem, the concept of Cyber Situation Awareness (CSA) [7] has emerged. The main idea of CSA in the large-scale IoT systems is recognizing the attack activities scattering among a large amount of noised data in IoT systems and grasping the whole IoT system security situation macroscopically. In this way, IoT system managers can make the responses appropriately and meanwhile effectively reduce the damage caused by the various attacks as possible. Among these powerful network attacks, Advanced Persistent Threat (APT) is one of the most robust multiple-steps attacks with characteristics of concealment, permeability, and pertinence, causing serious threats to all kinds of high-level information systems [3]. To mitigate the negative effects of APT, the fundamental problem is to design the cyber situation core technologies that aim at APT attack comprehension. Conventional cyber situation comprehension methods usually recognize attack intentions by only analyzing the attack alerts. However, the IoT system has the characteristics as follows: (1) the deployment of IoT terminal devices are especially scattered; (2) the majority of IoT terminal devices are resource-constraint, which means they are unable to install computing hungrily attack detecting software; (3) it is impossible to directly deploy security detection hardware for IoT terminal devices; (4) the conventional centralized cloud computing architecture cannot handle heavy transmission overheads of attack detect information. The aforementioned characteristics (1)–(3) will arise the risk of omitting alerts and failing to recognize some attack intentions. To solve this problem, we propose an APT Alerts and Logs Correlation Method (named APTALCM) to recognize the attack intentions and accomplish cyber situation comprehension in the IoT systems. To address the challenge caused by characteristic (4), we further present an edge computing-based framework for deploying APTALCM on the IoT systems, which can significantly reduce the communication overhead of cyber situation comprehension.

1.1. Our Contribution

In this paper, we propose APLALCM, a cyber situation comprehension method for IoT systems based on APT alerts and logs correlation. We summarize the contributions of this paper as follows:
  • We propose a cyber situation comprehension method for IoT systems which can effectively, accurately and in a timely manner reconstruct the APT attack scenarios. This method is also able to dig out the potential attack activities by analyzing the log data in IoT edge devices in a holistic way, making a significant contribution to the field of IoT attack detection.
  • We present a framework for deploying APTALCM on the IoT system based on edge computing architecture. This framework can greatly reduce the communication overheads of APT alerts and logs transmission among entities.
  • We introduce an alert and log instances similarity measures method based on the SimRank mechanism in APTALCM. This method can provide a basis for: (1) correlating the APT alerts generated by edge servers and cloud data center; (2) correlating the logs created by edge devices.
  • Experimental evaluation of the efficiency and accuracy of the proposed alert instances correlation module and log instances correlation module.

1.2. Organization of the Paper

The rest of the paper is organized as follows. Section 2 summarizes the background and related work of Cyber Situation Awareness. Section 3 provides an overview of cyber situation comprehension for IoT Systems, it contains a description of the proposed APTALCM and a framework of deploying APTALCM on the IoT system which is based on edge computing architecture. Section 4 presents the design details of APTALCM, which contains the cyber situation ontology construction module, alert instances correlation module, and log instances correlation module. Section 5 provides a view of our experiments and analysis. Section 6 presents the conclusions.

2. Background and Related Work

The situation is a key factor of CSA, which means the states of various objects in the cyber systems represented by a set of measurement values. In other words, the situation is a global concept and all the objects in the cyber systems are synthesized. Any sole state cannot be regarded as a situation because they only focus on the systematic perspective and relationships between the objects in systems. Cyber situation awareness is a cognitive process applied to cyber systems consisted of three phases. First, the original data generated in the system will be fused and processed gradually to accomplish the semantics extraction of the system states and activities. Then, the recognition procedure will be executed to obtain the exiting cyberspace activities and intentions of abnormal activities in the cyberspace. At last, representational cyber situations are acquired based on the effects of recognizing activities and intentions of abnormal activities in the cyber systems. According to the definition and illustration of CSA, we can summarize the entire CSA processes into three specific operations: cyber situation perception, cyber situation comprehension, and cyber situation projection. The general functional module of CSA is shown in Figure 1 which consists of the Cyber Situation Perception module, Cyber Situation Comprehension module, Cyber Situation Projection module, and Visualization module.
  • The primary duty of cyber situation perception is recognizing the activities (include attack activities) and the corresponding features in the information systems, providing for further cyber situation comprehension to acquire the attack intention.
  • The cyber situation comprehension is mainly used to discover the attack activities and understand the semantics of them to acquire the attack intention.
  • The cyber situation projection plays the role of analyzing and estimating the threats incurred by attack activities based on the first two phases. This kind of projection includes discovering the existing and possible effects on the objects in the cyber system incurred by attack activities. We can acquire the objective situation through projecting the cyber situation awareness results on certain objects in cyber systems. The projection process firstly constructs the cyber system situation by fusing the situation of various objects in the cyber system, then projects back the cyber situation results to further evaluate their effects.
  • The cyber situation can be visualized as the formation of who on what time at where generates what impact, namely (Who, When, Where, Impact). They are, Who represents the recognized attack activities; When represents the evolutionary process of the recognized attack activities; Where represents the distribution of the recognized attack activities; Impact represents the existing effects on the cyber system incurred by the recognized attack activities. The security managers can not only observe some attack activities during a certain period time but also acquire the distribution of all the activities (contains normal activities) according to their goals and requirements.
Attack intention recognition is a part of the primary objectives of cyber situation comprehension and our work is mainly focused on the attack intention recognition of APT. Existing work [2,3,4,5,6] on attack intention recognition usually focus on attack scenarios reconstruction while ignoring the related unaggressive activities, contributing to APT attack and multiple-step attack implementation. In addition to this, the intrusion ontology used in the field of intrusion detection cannot be applied to the CSA paradigm directly. Recently, statistical analysis mechanisms are proposed to discover the relationships between attack steps. However, these methods can only perform on static databases because they all depend on expert knowledge.
At present, hot topics of cyber situation comprehension mainly focus on two branches: (1) matching the alerts with acquired attack activities based on the prior knowledge; (2) analyzing relationships between the alerts without prior knowledge. Cuppens [4] developed the LAMBDA programming to accomplish the description of templates and matching process. The researchers [5,6,7,8] usually divide an attack activity into several stages, such as the Intrusion Kill Chains Model [9]. Most recently, there are primarily two types of methods based on similarity measure: The attribute similarity method and timing sequence method. The key point of these methods is the definition of a suitable similarity measure metric. In [10,11], the authors defined a similarity function and clustered the IDS alerts based on the similarities between attributes. Later, Ourston proposed an alert correlation method [12] based on the Hidden Markov Model to get the attack sequences with the highest possibilities. Qiao proposed a simple formula for computing the similarity between alerts [13]. They apply a double clustering followed by a loose application of LCS (Longest Common Subsequence). Moreover, Murphy uses a similarity matrix based on the services each attack exploits [14,15]. Clusters of alerts are extracted using Divisive Hierarchical Clustering (DHC) on a social network graph derived from the similarity matrix. In the JEAN (Judge Evaluation of Attack Intension) system, proposed by [16], the process starts building a database of attack session graphs from a training set of IDS alerts using J-Fusion, an algorithm for alert fusion. In a brief paper, Zhang [17] presented a clustering method based on a specific metric between IP addresses.

3. Cyber Situation Comprehension for IoT Systems

The primary duty of cyber situation comprehension in IoT is analyzing the activities (include attack activities) and recognizing the attack intentions. Conventional cyber situation comprehension methods usually recognize attack intentions by only analyzing the attack alerts. However, the IoT system has the characteristics: (1) IoT terminal devices are deployed especially scattered; (2) the majority of IoT terminal devices have limited hardware resources which are unsuitable for installing large-scale attack detection software; (3) it is impossible to deploy security detection hardware directly on the resource-constraint IoT terminal devices. Therefore, we only can deploy the security detection equipment on the boundary of certain region IoT devices. The above characteristics will arise the risk of alerting omission and failing to recognize some attack intentions. To solve the above problems, we introduce the IoT edge device log community detection method to recognize the potential attack intentions that have not been detected; making up for the deficiencies when conventional cyber situation comprehension methods apply to the IoT systems. Then, we can acquire the activities in two forms: attack alerts and edge devices logs. As the number of activities is too large in the IoT systems, it is impossible to correlate all the activities at a short time slot. Therefore, we use the following two benchmarks to improve the efficiency of activities correlation: (1) APT attack alerts that are essential to be correlated generating the APT attack scenarios; (2) the logs generated in the edge devices infected by APT attacks are essential to be correlated to detect the unaggressive malicious activities. According to these two standpoints, results of cyber situation comprehension are composed of APT attack scenarios and log instance communities in the IoT systems. As a novelty concept, the log instance community is a kind of log instance cluster which composes of log instances that have similar attributes and operating purposes.
Based on the above discussions, we propose an APT Alerts and Logs Correlation Method (APTALCM) to achieve the cyber situation comprehension in the IoT systems. The architecture of APTALCM is shown in Figure 2. It needs to be emphasized that APTALCM is not only a theoretical method, but can be applied to other information systems. The large number of sensors embedded in IoT devices result in the complicated data analysis for massive attack alerts and logs. In this situation, when we apply the APTALCM based on conventional cloud computing architecture, all alerts and logs should be transmitted to a central server, so as to increase the huge communication overhead for data transmission and further affect the network performance. To address this, the emerging edge computing architecture [18] can be used to meet the challenge of data transmission costs in the IoT systems. Thus, we present an edge computing-based framework for deploying our proposed APTALCM mechanism. Figure 3 represents a typical IoT system based on edge computing architecture and it contains three layers: cloud data center, edge servers, and edge devices. Firstly, the cloud data center provides the core network access and centralized cloud computing services and management functions for IoT edge devices. Secondly, edge servers are responsible for providing virtualized and multiple management services. Finally, edge devices include all types of IoT devices (e.g., intelligent camera, automatic robot, and industrial sensing equipment) connected to the edge servers which are not only playing the role of data consumers but also data producers to participate in the distributed infrastructure for all three layers.
For the practical implementation of our proposed APTALCM in the edge computing architecture, we describe the detail of each module of our method. Cyber situation ontology is proposed for modeling the concepts and properties of the cyber situation awareness paradigm in IoT systems. At present, there are no ontologies that are enough mature to satisfy the requirement of cyber situation awareness. Therefore, in this paper, we proposed the APTALCM, which defines a set of representational primitives for modeling the domain of cyber situation as the cyber situation ontology. The inputs of this phase are APT alerts and logs affected by APT attacks from various detection sensors in the IoT systems. The corresponding outputs are the cyber situation ontology instances. To implement the APTALCM in the system presented in Figure 3, we deploy the Ontology Construction module on cloud data center layer to convert APT alerts generated from IDS in edge servers layer, firewalls and IDS in cloud data center layer to alert instances, and we also deploy the Ontology Construction module on edge servers layer to convert the log data to log instances.
After the cyber situation ontology construction, the situation ontology instances will face two operational options according to the different instance types (alert instance & log instance). That is, alert instances raised from the preceding phase will be fed into the alert instance correlation module (AICM) and the log instances will be transmitted to the log instance correlation module (LICM). Specifically, the primary duty of AICM is to recognize APT alert instances which are belonged to an APT attack scenario in the IoT systems. To apply the APTALCM in the system presented in Figure 3, we deploy AICM on cloud data center layer to accomplish APT attack scenarios reconstruction, and then the cloud data center will transmit the Victim_HostIp to edge servers’ layer. Finally, the edge servers select the target IoT edge device to apply log correlation. LICM takes the log instances generated by the victim edge device as inputs to detect the log instance communities, so as to recognize the potential malicious activities. Similarly, we also deploy the LICM on the edge servers’ layer to detect log communities through the log instances and further recognize the potential malicious activities. Followed by this way, our designed systems framework has the following advantages: (1) the communication overheads between cloud data center and edge devices can be greatly reduced by deploying the edge servers layer in the middle and the shares between edge servers and cloud data center are only log community results; (2) a large part of computation costs of log community detection can be outsourced to the edge servers, so as to make up the resource-constraint drawback of IoT edge devices. Guiding by this cyber situation comprehension for IoT systems framework, the IoT system security managers can effectively acquire APT attack scenarios and log communities on cloud data center to recognize APT attack intentions in a specific IoT system based on edge computing architecture.

4. APTALCM Design

We have proposed the APT alerts and logs correlation method (APTALCM) to achieve the cyber situation comprehension in the IoT systems and provided the edge computing-based framework for deploying APTALCM on the IoT system. Here, we give a detailed description of our proposed APTALCM mechanism.

4.1. Cyber Situation Ontology Construction

According to the APTALCM architecture, the first module of APTALCM deployed on cloud data center and edge servers will convert the received APT alerts and edge device logs into cyber situation ontology instances. Thus, our first work is to propose a formal definition of cyber situation ontology. Different from the previously proposed methods directly send the ontology instances to attack scenarios reconstruction module, we introduce a method based on the SimRank mechanism to calculate the similarity between cyber situation instances.

4.1.1. Cyber Situation Ontology Initialization

A widely accepted definition of ontology is shown as follows: the ontology defines a set of representational primitives with which to model a domain of knowledge or discourse. The representational primitives are typically classes (or concepts), attributes (or properties), and relationships (or relations between class members) [2].
According to the ontology definition and the combination of the cyber situation characteristics, we introduce a formalized definition of the cyber situation ontology as follows: O = ( C ,   A ,   D ,   R ,   S ) . The elements C, A, D, R and S represent the set of classes (alert or log), the set of attributes, the domain of the cyber situation ontology, the set of relationships of the instances, and the set of similarity between the instances in the IoT system based on edge computing architecture (alert instances or log instances), respectively. Then, we define A ( c i ) to represent the attributes of a class c i , I ( c i ) m as an instance of the class c i . Besides, the attribute value of an instance can be represented as A ( I ( c i ) m ) and SIM ( I ( c i ) m , I ( c i ) n ) presents the similarity between instances I ( c i ) m and I ( c i ) n .
The APT alert class consists of alert instances converted from APT alert detected by various attack detection sensors (e.g., IDSs in edge servers, IDS in cloud data center, firewall between edge servers and cloud data center) and each alert instance represents a suspicious attack step of an APT attack in the IoT system based on edge computing architecture. In this paper, we set seven attributes for APT alert class to analyze the characteristics of APT alerts output from different attack detection sensors: Timestamp, Alert_Type, Src_Ip, Dest_Ip, Src_Port, Dest_Port, and Victim_HostIp. Attributes values of an alert instance stored in a 7-dimensional vector, A ( I ( a l e r t ) m ) = ( a 1 , a 2 , a 3 , a 4 , a 5 , a 6 , a 7 ) . The description of each attribute is shown in Table 1.
The edge device log class consists of the log instances transformed from the log data generated in the edge devices. The log type depends on the operating system installed in the edge devices. On the assumption that all the edge devices are installed with Windows Embedded Compact (Windows CE), the log data that can be provided by the application programs are presented in Table 2. The essenceof transforming the log data to log instances is extracting representative attributes. In this work, we select 19 attributes from the log data are shown in Table 3. As the data generate from different application programs, not all the log instances have the same attribute type, we also give the log instance type. Attributes value of a log instance can be presented as a 19-dimensional vector: A ( I ( l o g ) m ) = ( a 1 , a 2 a 18 , a 19 ) . If a log instance only contains attributes a1, a3, a5, the other elements of its attribute vector are zero.

4.1.2. Calculate Instance Similarity

We proposed a cyber situation instance similarity calculation method to provide a correlation basis for the alert correlation module and log correlation module. Each alert or log is an instance of cyber situation ontology, and the relationship between them can be described as a labeled directed graph with similarity. As its graphic character, the proposed method is built on the SimRank mechanism.
The SimRank mechanism provides a similarity measure of structural context where the related objects are linked by directed edges. It defines a recursive function calculating the similarity between object pairs based on the concept of context. The core idea is that objects are similar in terms of referenced by similar objects.
We measure the similarity between the cyber situation instances, which fall within the same class. In other words, we measure the similarity within the alert class and edge device log class. To compare the similarity between two cyber situation instances I ( c ) m and I ( c ) n within the same class, we use the following two sets of parameters:
  • Attributes: The attributes of each cyber situation instance, A ( I ( c ) m ) and A ( I ( c ) n )
  • Correlated instances: The instances which have already correlated to each cyber situation instance I ( c ) m and I ( c ) n are presented as Co ( I ( c ) m ) and Co ( I ( c ) n ) .
The basic similarity measure of cyber situation instances is calculating the similarity between their attributes and the correlated instances. The formalized representation of the similarity between two cyber situation instances is shown in Equation (1).
SIM ( I ( c ) m , I ( c ) n ) = γ SIMA ( I ( c ) m , I ( c ) n ) + β SIMCo ( I ( c ) m , I ( c ) n ) γ = | A ( I ( c ) m ) A ( I ( c ) n ) | | A ( I ( c ) m ) A ( I ( c ) n ) | + | Co ( I ( c ) m ) Co ( I ( c ) n ) | β = | Co ( I ( c ) m ) Co ( I ( c ) n ) | | A ( I ( c ) m ) A ( I ( c ) n ) | + | Co ( I ( c ) m ) Co ( I ( c ) n ) |
It indicates that SIMA ( I ( c ) m , I ( c ) n ) [ 0 , 1 ] and SIMCo ( I ( c ) m , I ( c ) n ) [ 0 , 1 ] , respectively. Two parameters γ and β are defined to normalize the impact degree where γ + β = 1 . Therefore, we can draw the conclusion that SIM ( I ( c ) m , I ( c ) n ) [ 0 , 1 ] . Then, we will give the formalized representation of SIMA ( I ( c ) m , I ( c ) n ) in a mutually recursive method. SIMA ( I ( c ) m , I ( c ) n ) measures the similarity between cyber situation instances based on attribute similarity, SIMA ( A i ( I ( c ) m ) , A i ( I ( c ) n ) ) measures the similarity between the attributes of each cyber situation instance. Note that, the similarity between the same instances can be set as 1 and other conditions can be calculated in Equation (2).
SIMA ( ( I ( c ) m , I ( c ) n ) = | A ( I ( c ) ) | i = 1 | A ( I ( c ) ) | SIMA ( A i ( I ( c ) m ) , A i ( I ( c ) n ) )
The similarity between two attributes can be set as 1 on the condition of A i ( I ( c ) m ) = A i ( I ( c ) n ) . If no pairs of the attributes are identical, SIMA ( I ( c ) m , I ( c ) n ) will be calculated based on Equation (3) where Co i ( I ( c ) m ) is the correlated instance to I ( c ) m . The method of acquiring them will be discussed in Section 4.2 and Section 4.3.
SIMA ( I ( c ) m , I ( c ) n ) = i = 1 | Co ( I ( c ) m ) | j = 1 | Co ( I ( c ) n ) | SIMA ( Co i ( I ( c ) m ) , Co j ( I ( c ) n ) ) | Co ( I ( c ) m ) | | Co ( I ( c ) n ) |
The SIMCo ( I ( c ) m , I ( c ) n ) measures the similarity between cyber situation instances based on its correlated instances similarity and calculated in Equation (4). On the condition that either I ( c ) m or I ( c ) n does not have any correlated instance, we will hardly infer any similarity between them.
SIMACo ( I ( c ) m , I ( c ) n ) = { 1 I ( c ) m = I ( c ) n i = 1 | Co ( I ( c ) m ) | j = 1 | Co ( I ( c ) n ) | SIMCo ( Co i ( I ( c ) m ) , Co j ( I ( c ) n ) ) | Co ( I ( c ) m ) | | Co ( I ( c ) n ) | I ( c ) m I ( c ) n

4.2. Alert Instances Correlation

As APT attack alerts are critical to be correlated generating the APT attack scenarios, we focus on deploying the Alert Instance Correlation module on cloud data center to accomplish APT attack scenarios reconstruction. The APT attack usually performs through a few steps with characteristics of persistent, targeted and aiming at the specific object. The final mission of APT is obtaining confidential data in the IoT systems. To achieve this goal, the attack process usually contains complex multistep. Alert instances which are extracted in edge servers and cloud data center belong to different APT attack step, Table 4 summarizes the matchup between APT attack scenario steps and alert instances.
The first step (Intelligence Gathering) contains some passive process and the corresponding alerts are not readily be detected by network traffic sensors. The fourth step (Lateral Movement) is internal traffic within the edge devices while the APT alerts are detected from the inbound and outbound traffic. Based by the above facts, we only correlate the APT alert instances generated in Step 2, Step 3, Step 5 and Step 6 of an APT attack scenario.
The AICM outputs two kinds of correlated alert instance clusters: C l u s t e r f u l l and C l u s t e r s u b . The C l u s t e r f u l l will be generated when AICM has correlated a full APT attack scenario during the correlation duration, which has every step of an APT attack scenario. To be more specific, the C l u s t e r f u l l include four alert instances, which generated within different step of a full APT attack scenario. We can correlate 9 alert instance cluster patterns based on Table 4 and the APT attack life cycle. These alert instance cluster patterns can be formalized represented as:
C l u s t e r f u l l = P C A D P = [ I ( p 1 ) I ( p 2 ) I ( p 3 ) ] ,   C = [ I ( c 1 ) I ( c 2 ) I ( c 3 ) ] ,   A = [ I ( a 1 ) ]   a n d   D = [ I ( d 1 ) ] .
The C l u s t e r s u b will be produced when AICM has correlated two or three rather than all steps of an APT attack scenario during the correlation duration. In this fractional correlated alert cluster, one or two step alert instances are missing. To be more specific, the C l u s t e r s u b includes two types of alert clusters: sub_steps_correlated_two_steps_alert_cluster and sub_steps_correlated_three_steps_ alert_cluster. We can correlate 64 alert instance cluster patterns based on Table 4 and the APT attack life cycle. These alert instance cluster patterns can be formalized represented as:
C l u s t e r s u b = [ C A D ] [ P A D ] [ P C A ] [ ( P C ) ( A D ) ] [ A D ] [ C ( A D ) ] [ P ( C A D ) ] P = [ I ( p 1 ) I ( p 2 ) I ( p 3 ) ] ,   C = [ I ( c 1 ) I ( c 2 ) I ( c 3 ) ] ,   A = [ I ( a 1 ) ]   a n d   D = [ I ( d 1 ) ]

4.2.1. Alert Instance Filter (AIF)

The APT alert instances which are constructed by the cyber situation ontology construction module are fed to the alert instance correlation module. As the ATP alerts are produced by various detection sensors (e.g., IDSs in edge servers, IDS in cloud data center, firewalls between edge servers and cloud data center), the same alert instances are given the opportunity to generate during a correlation duration. The alert instance filter (AIF) discards the repeated and redundant alert instances. It checks whether the new arriving alert instance has been constructed during the correlation duration through compare the alert instance type and instance attributes value with the previous instances. It is clear, discarding invalid alert instances can reduce the computation cost of AICM.

4.2.2. Alert Instance Cluster (AIC)

The alert instance cluster module (AIC) allocates the most similar alert instances into a certain cluster. An APT full steps scenario or sub-steps scenario can present an alert instance cluster. Each alert instance presents a disparate attack step. The AIC module gets the AIF products as input and stores the alert instances during a correlation duration. The AIC module tests the possibility of clustering as soon as a new alert instance arrives based on the APT attack scenario characteristics, so as to it is restricted by the following two rules:
  • Rule 1. Alert instances, which belong to the same APT attack step, should not be allocated into the same cluster.
  • Rule 2. APT attack alert instances should trigger within the correlation duration and alert instances order should in accord to the APT attack life cycle.
Formally, Timestamp p ,   Timestamp c ,   Timestamp a and Timestamp d stand for the trigger time of four alert instances respectively, which belong to four attack steps of the APT scenario. They only if comply with the following criteria that can be clustered into one cluster:
Timestamp p < Timestamp c < Timestamp a < Timestamp d
Timestamp d Timestamp p < C o r r e l a t i o n D u r a t i o n
All the generated alert instance clusters are presented as a directed graph and scattered alert instances are linked by directed edges based on the similarity. Then the clusters will be consumed by the correlation indexing module. Each cluster is consisted of maximum of four ordered alert instances and recorded in an instance_cluster_dataset (ICD) which is deployed on the cloud data center.
When a new alert instance arrives in AIC module, we firstly check it belongs to which APT attack step. Based on the different alert instance type, AIC chooses different operation options. We have the conclusion: Point of entry (P) which is the second step of an APT attack scenario is the first detectable attack step. When AIC gets an alert instance I ( p i ) it generates a new cluster and allocates I ( p i ) at instance_1, which is recorded in ICD.
When AIC gets an alert instance I ( c i ) (namely: Domain_flux_instance or Ip_instance or Ssl_instance) AIC inquires the similarity degrees SIM ( I ( c i ) , I ( p i ) ) between I ( c i ) and I ( p i ) from the cyber situation ontology construction module. I ( p i ) are the instances which are already recorded in ICD in the order instance_1 of the existing clusters. The c i and p i are different sub-classes of class alert, then I ( c i ) and I ( p i ) can be treated as I ( a l e r t ) . Therefore, it is feasible to calculate the value of SIM ( I ( c i ) , I ( p i ) ) . AIC adds the I ( c i ) to the order instance_2 of cluster which not only has the largest value of SIM ( I ( c i ) , I ( p i ) ) but also meet the flowing two conditions in Equations (9) and (10). Then we can get the correlated instance of I ( c i ) : Co ( I ( c i ) ) = I ( p i ) , and send the Co ( I ( c i ) ) back to the cyber situation ontology construction module for later instance similarity degree calculation. If there are no suitable alert instances I ( p i ) to be chosen, AIC will generate a new cluster and allocate I ( c i ) to instance_2 and store it in ICD.
Timestamp I ( p i ) < Timestamp I ( c i )
Timestamp I ( c i ) Timestamp I ( p i ) < C o r r e l a t i o n D u r a t i o n
When AIC get an alert instance I ( a i ) (namely: Scan_instance) AIC inquires the similarity degrees SIM ( I ( a i ) , I ( c i ) ) between I ( a i ) and I ( c i ) from the cyber situation ontology construction module. I ( c i ) are the instances which are already stored in ICD at the order instance_2 of the existing clusters. AIC adds the I ( a i ) to the order instance_3 of cluster which not only has the largest value of SIM ( I ( a i ) , I ( c i ) ) but also meets the flowing two conditions in Equations (11) and (12). If the chosen I ( c i ) is the first instance of the cluster, the above two conditions should be changed by Equations (13) and (14). Then we can get the correlated instance of I ( a i ) : Co ( I ( a i ) ) = I ( c i ) , and send the Co ( I ( a i ) ) back to the cyber situation ontology construction module for later instance similarity degree calculation. If there are no suitable alert instances I ( c i ) to be chosen, AIC will generate a new cluster and allocate I ( a i ) to instance_3 and store it in ICD.
Timestamp I ( p i ) < Timestamp I ( c i ) < Timestamp I ( a i )
Timestamp I ( a i ) Timestamp I ( p i ) < C o r r e l a t i o n D u r a t i o n
Timestamp I ( c i ) < Timestamp I ( a i )
Timestamp I ( a i ) Timestamp I ( c i ) < C o r r e l a t i o n D u r a t i o n
When AIC get an alert instance I ( d i ) (namely: Tor_intance) AIC inquires the similarity degrees SIM ( I ( d i ) , I ( a i ) ) between I ( d i ) and I ( a i ) from the cyber situation ontology construction module. I ( a i ) are the instances which are already stored in ICD at the order instance_3 of each existing cluster. AIC adds the I ( d i ) to the order instance_4 of cluster which not only has the largest value of SIM ( I ( d i ) , I ( a i ) ) but also meet the flowing two conditions in Equations (15) and (16). If the chosen I ( a i ) is the first instance of the cluster the above two conditions should be changed by Equations (17) and (18). If the chosen I ( a i ) is the second instance of the cluster the above two conditions should be changed by Equations (19) and (20). Then we can get the correlated instance of I ( d i ) : Co ( I ( d i ) ) = I ( a i ) , and send the Co ( I ( d i ) ) back to the cyber situation ontology construction module for later instance similarity degree calculation. If there are no suitable alert instances I ( a i ) to be chosen, it means the I ( d i ) has no relationships with any clusters in the ICD, AIC will discard the I ( d i ) .
Timestamp I ( p i ) < Timestamp I ( c i ) < Timestamp I ( a i ) < Timestamp I ( d i )
Timestamp I ( d i ) Timestamp I ( p i ) < C o r r e l a t i o n D u r a t i o n
Timestamp I ( a i ) < Timestamp I ( d i )
Timestamp I ( d i ) Timestamp I ( a i ) < C o r r e l a t i o n D u r a t i o n
Timestamp I ( c i ) < Timestamp I ( a i ) < Timestamp I ( d i )
Timestamp I ( d i ) Timestamp I ( c i ) < C o r r e l a t i o n D u r a t i o n
In general, we correlate the alert instance to the most similar prior-step alert instance. A correlation example is shown in Figure 4.

4.2.3. APT Attack Scenario (AAS)

APT attack scenario (AAS) module confirms the alert instances which belonging to the same alert instance cluster whether or not can construct a full or sectional APT attack scenario in the IoT system based on edge computing architecture. As we knew each ATP alert instance cluster is constructed incrementally, it has the opportunity that later received alert instance reforms the previously correlated alert instances. To address this problem, we add a parameter L i j on the correlated links between every two alert instances which belong to the same cluster. The parameter L i j consists of two values: 1 or 0. When alert instance_i and instance_j have identical Victim_HostIP the L i j will be set as 1; otherwise, the L i j will be set as 0. The ASS will face four states of L i j during the correlation. The four states and corresponding operations are shown in Figure 5, and we describe them as follows:
  • ( 1 , 1 ) : APT alert instances can belong to a certain AAS.
  • ( 0 , 1 ) : The latest two alert instances are much more similar than the prior two alert instances. Then the first link should be disconnected and construct a new instance cluster contains the latest two alert instances waiting for the coming correlation.
  • ( 1 , 0 ) : No evidence can trigger the disconnection, just waiting for the coming instances.
  • ( 0 , 0 ) : No evidence can trigger the disconnection, just waiting for the coming instances.
We also introduce a parameter LinkNum to check the clustered APT alert instances and discard the uncorrelated alert instances. LinkNum can be formulated as follows:
L i n k N u m c l u s t e r k = i = 1 , j = i + 1 i n s t a n c e _ i c l u s t e r k i n s t a n c e _ j c l u s t e r k 3 L i j
L i n k N u m = 0 . APT alert instances in the cluster have no effect and cause with each other; they cannot construct an APT attack scenario.
L i n k N u m = 1 . APT alert instances in the cluster can generate a correlation between two alert instances and they can construct a C l u s t e r s u b with two steps.
L i n k N u m = 2 . APT alert instances in the cluster can generate correlations between three alert instances and they can construct a C l u s t e r s u b with three steps.
L i n k N u m = 3 . APT alert instances in the cluster can generate a correlation between four alert instances. They can construct a C l u s t e r f u l l and be presented as an APT attack scenario.
a s s v k = ( c l u s t e r k , L i n k N u m , V i c t i m H o s t I p , S i m D e g )
S i m D e e = ( SIM ( i n s t a n c e _ 1 , i n s t a n c e _ 2 ) ,   SIM ( i n s t a n c e _ 2 , i n s t a n c e _ 3 ) , SIM ( i n s t a n c e _ 3 , i n s t a n c e _ 4 ) )
The a s s v k vectors are the sectional output of cyber situation comprehension to be used in future cyber situation projection. In the condition that i n s t a n c e _ i alert instance is absent, the value of SIM ( i n s t a n c e _ i 1 , i n s t a n c e _ i ) and SIM ( i n s t a n c e _ i , i n s t a n c e _ i + 1 ) can be set as 0. Meanwhile, the LICM modules which are deployed on edge servers can get the attribute Victim_HostIp from the AIC module which is deployed on cloud data center to determine the correlation range of logs which are generated in edge devices.

4.2.4. Module Implementation

We implement the algorithm of the AICM module in C programming language after getting the simulation dataset. The pseudo-code of the AICM module is provided in Figure 6.

4.3. Log Instances Correlation

Advanced Persistent Threat (APT) attack has multiple stages for the sake of being elusive and stealthy. Besides the APT alerts generated during the multiple stages, this type of attack pattern inevitably leaves some log information spatiotemporally dispersed across victim edge devices in the edge computing-based IoT systems. Therefore, we deploy the LICM on the edge servers to detect log communities through the log instances and further recognize the potential malicious activities. A large part of computation costs of log community detection can be outsourced to the edge servers, so as to make up the resource-constraint drawback of IoT edge devices. Firstly, the preliminary correlation module constructs the weighted graphs by correlating log instances which are extracted from the victim edge devices log. Then, LICM will discover the log instance communities hid within the weighted graphs by log instances community detection module.

4.3.1. Preliminary Correlation (PC)

The input of preliminary correlation module (PC) are the log instances extracted from the logs which are generated in victim edge devices, the outputs are directed and weighted graphs. In this work, we represent the log instances as nodes and regard the relationships between them as edges. The weights of edges illustrate the similarity between log instances and the directions of edges illustrate the effect and cause relationship between them. Once the LICM which is deployed on an edge server gets an ASS vector from the AICM which is deployed on cloud data center it starts to construct a preliminary correlated graph based on the log instances which are extracted from the victim edge device log. Some preprocessing may leave logs before the significant APT alerts occur, so we correlate the log instances before the first alert instance generated for a short time of τ . As the log instances generated in a timing sequence, the preliminary correlation module inquires the similarity from the cyber situation ontology construction module in the same strategy. To construct a weighted and directed graph the similarity between the log instances are represented as weights according to the following strategy:
[ I ( l o g ) 1   , I ( l o g ) 2 , I ( l o g ) 3 , , I ( l o g ) n ] is a log instance sequence generated according to the timing order. When PC module receives a new log instance I ( l o g ) i it starts to inquire the SIM ( I ( l o g ) 1 , I ( l o g ) i ) , SIM ( I ( l o g ) 2 , I ( l o g ) i ) ,   SIM ( I ( l o g ) 3 , I ( l o g ) i ) , …,   SIM ( I ( l o g ) i 1 , I ( l o g ) i ) from the cyber situation ontology construction module. On the condition that SIM ( I ( l o g ) i , I ( l o g ) j ) 0 , create a directed edge from I ( l o g ) i to I ( l o g ) j set ω i j = SIM ( I ( l o g ) i , I ( l o g ) j ) , generate a correlated instance of I ( l o g ) j set Co n ( I ( l o g ) j ) = I ( l o g ) i and pass back Co n ( I ( l o g ) j ) to cyber situation ontology construction module. Otherwise, ω i j = 0 . There are no correlated relationships (edges) between I ( l o g ) i and I ( l o g ) j .
The PC module acquires the weighted graph of log instances is shown in Figure 7, and this module will send this graph to the log instance community detection module for later operation.

4.3.2. Log Instance Community Detection (LICD)

Taking account for the log instance graphs scale, log instance community detection module has the demand of proposing an efficient community detection method to extract the log instance communities from the intricate directed and weighted correlated instance graph. Comparing the diverse existing machine learning method used in the community detection, the LICD module owns a log instance community detection method based on the Louvain method, which has the advantage of managing large-scale nodes networks such as the edge computing-based IoT system.
At the initial phase of LICD, each log instance in the graph constructed by the PC module represents a solitary log instance community. m ω i m and m ω m j respectively represents the totality weights added on edges associate to log instances I ( l o g ) i and I ( l o g ) j , c I ( l o g ) i and c I ( l o g ) j respectively represents the log instance community which I ( l o g ) i and I ( l o g ) j belong to. The θ f u n c t i o n in the LICD module is used to separate the log instances which belong to the different log instance communities, means θ ( i , j ) = 1   if   i = j , θ ( i , j ) = 0 otherwise. To compare the density degree of the correlations within the log instance communities with the correlations across the log instance communities, LICD introduces an evaluation index D e n D e g which is defined as follows.
D e n D e g = I ( l o g ) i , I ( l o g ) j [ ω i j m ω i m m ω m j I ( l o g ) i , I ( l o g ) j ω i j ] θ ( c I ( l o g ) i , c I ( l o g ) j ) I ( l o g ) i , I ( l o g ) j ω i j
As soon as the LICD module finishes the log instance initialization, it repeats actions to optimize the index D e n D e g in the following strategies: for each log instance I ( l o g ) k , shift I ( l o g ) k from its attached log instance community c I ( l o g ) k into its correlated log instance Co n ( I ( l o g ) k ) attached communities. LICD evaluates the value change of index D e n D e g and allocates I ( l o g ) k into the log instance community c I ( l o g ) k i n , which has the most obvious index D e n D e g increase. If the maximum increase is not positive, the log instance I ( l o g ) k will not be shifted from its original log instance community. LICD applies this process repeatedly and sequentially to each log instances until no Δ D e n D e g occurs and gets the detected log instance communities as the segmental output of cyber situation comprehension. The optimization procedure of detecting log instance communities is shown in Figure 8.

4.3.3. Module Implementation

We implement the algorithm of the LICM module in Python after getting the log data. The LICM module pseudo-code is provided in Figure 9:

5. Experimental Evaluation of APTALCM

5.1. Evaluation of the Alert Instance Correlation Module

As there is no available public data set that can provide enough APT attack alerts in the edge computing-based IoT system, we adapt to construct a specialized simulation data set. The duty of the alert instance correlation module is to recognize various alert instances could belong to a certain APT attack scenario. To significantly evaluate the AICM module, the simulation data set consists of APT alerts belong to APT attack scenarios and other general alerts do not belong to the APT attack scenarios. The experiment aims to verify whether the AICM module can reconstruct the APT scenarios hidden in the constructed data set.

5.1.1. Data Generation

To construct the simulation data set, we use Python to write a script, which constructs two classes of alert: Correlative alerts are part of a C l u s t e r f u l l or C l u s t e r s u b ; scattered alerts do not belong to any of the alert instance cluster. In our experiments, we set seven attributes to each alert: Alert_Type, Timestamp, Src_Ip, Dest_Ip, Src_Port, Dest_Port, and Victim_HostIp. To guarantee the randomness of the generated alert, we select the Alert_Type from the provided eight ATP alert types. We assign a random value start from 01 February 2019 00:00:01 to 30 March 2019 23:59:59 to Timestamp. The Src_Ip value is assigned based on the selected Alert_Type.
The Dest_Ip assigned randomly with an IP address in an industry IoT network. We select the Src_Port randomly from the 49,140 to 65,521 ranges, which are usually allocated dynamically to initiate a connection. Then, we further assign a random port number to Dest_Port based on the Alert_Type. The Victim_HostIp is assigned randomly with an IP address in an industry IoT network. Besides, we have generated 5000 APT alerts for the simulation data set consisted of 150 C l u s t e r f u l l , 150 C l u s t e r s u b , and 4000 random isolated alerts. In this way, the simulation data set for evaluating the AICM module have accomplished. Note that, as there is no standard APT attack data set for testing the performance of our method, we use the above constructed simulate data set to present the real APT attack in the edge computing-based IoT system. The attribute types of simulation alert data and the real APT alert are identical. The biggest difference between the simulation data set and the real APT alert is that attribute value distribution perhaps contains much more random features in the simulation data set, but the real APT alerts maybe generate follow some certain intentions guided by attackers. However, it will not limit to disclose the correlated ability of our method if the data set is scattered.

5.1.2. Correlation Performance

After the data generation phase, we applied the AICM module algorithm on the constructed simulation data set. The correlation result is presented in Table 5. We select the false-positive rate (FPR) and the true-positive rate (TPR) as the correlation effect measurement parameters. The parameters involved in our experiments are {P, N, TP, FP}, which present the quantity of APT alerts, the quantity of random isolated alerts, the quantity of true-positive APT alerts, and the quantity of false-positive APT alerts, respectively. Then, the correlation effect measurement parameters TPR and FPR can be formalized as follows:
TPR = TP TP + FN
FPR = FP FP + TN
Here, we can find the TPR of the two steps Clustersub is higher than any other clusters. It is evident that the TPR is lower with the alert instance cluster steps quantity increaser. This is primarily because more alert instances correlation process will increase the possibility of the random isolated alert instances to be unexpected correlated. When decreasing the TPR, the unexpected random isolated alert instances correlation can also incur the false positive correlation result. As the larger step quantity of the clusters, the stronger ability they equipped to amend the previous correlation by the later alert instances, so that FPR is lower with the alert instance cluster steps quantity increaser. In general, holistic TPR and FPR are well satisfied. To reveal the effect on the detection accuracy with the data set size changing we also applied the AICM module algorithm on the sectional simulation data sets whose alert quantity are 1000, 2000, 3000 and 4000. We can get the TPR variation trend on the condition of data sets size changing in Figure 10. It is obvious that TPRs of APT three steps cluster, APT full scenario and Total APT cluster increase with the data set size expanding. This phenomenon is due to more alerts can also enhance the amendment ability of the pre-step correlation operation. However, TPR of the APT two step cluster slightly decreases with the data set size expanding, because of more alerts within two certain steps only can increase the risk of leaving out some correlations and there are no pre-step correlation operations to be amended. However, we cannot dig out any variation trends of FPR on the condition of data sets size changing in Figure 11, and it is probably due to the absolute value of the FPRs are so low.

5.1.3. Performance Comparison Between AICM And Existing APT Detection Systems

We compared the performance of the developed AICM module with the three typical APT scenarios detection methods by operating the three methods on the simulation data set we generated in Section 5.1.1 to show the advantage of ACIM. We also choose the false-positive rate (FPR) and the true-positive rate (TPR) as the correlation effect measurement parameters. The value of TPR and FPR can be calculated according to Equations (25) and (26). The FPR and TPR of each method can be regarded as the comparative results which are presented in Table 6.
We can get the evident results that the other three proposed APT scenarios detection methods are not able to handle the problem of balancing the higher TPR and lower FPR properly. It is obvious to see that AICM acquire satisfactory TPR with not too high FPR. As the only method can approximately get the similar performance to AICM, the C&C-based method has disadvantages of failing to accomplish real-time APT attack detection. Comparing the experiment results of Spear phishing based and TerminAPTor, we find under the premise of similar valid detection capability of APT attack (The TPR values of the two methods are approximately equal), increasing the step quantity will incur more false positive APT alerts.

5.2. Evaluation of the Log Instance Correlation module

We implement the algorithm of LICM in Python and make full use of the convenience of package python-Louvain to accomplish log instance community detection. The experiment environment is described as follows: (1) a victim Windows 10 64-bit operating system running on a host with an Intel Core i5-7200u 2.0 GHz CPU, 8GB RAM. (2) an attack Windows 10 64-bit operating system running on a host with an Intel Core i7-8550u 2.53 GHz CPU, 16GB RAM. We also assign extra roles for the attack host: FTP server, C&C server, and Apache server.

5.2.1. Data Generation

To construct the log data set and evaluate the LICM module algorithm we record the log data from the log providers and the log data quantity of each provider is shown in Table 7. We record the log data by routinely work without perceiving that some operations have triggered APT attack activities. We obtain these log data after some attacks have launched to simulate the APT attack scenario.

5.2.2. Correlation Performance

We have applied the LICM module algorithm on the recorded log dataset to evaluate the performance of log community detection on 7 APT attack scenarios such as Attack on Aerospace (AA), Hacking Team (HT), Tibetan and HK (TH), Russian Campaign (RC), Op-Tropic Trooper (OTT), APT on Taiwan (AT), and Op-Clandestine Fox (OCF). We also select the FPR and TPR as the correlation effect measurement parameters. Log instances within any detected community are regarded as malicious ones and the others as benign ones. The TRP is the portion of the malicious log instance and benign log instance which have been correctly classified. The FPR is the portion of the actual benign log instances, which are unexpectedly classified into the malicious cluster. The results are shown in Figure 12; we can see that TPRs of LICM module work well on the 7 typical APT scenarios and the FPRs are also medium.

5.3. Attack Scenario Reconstruction Time

The time complexity of the attack scenario reconstruction versus the number of alert and log instances is one of the most important parameters in evaluating the proposed technique. The scenario reconstruction time is the average time from the time an alert is generated to the time this newly generated alert is correlated to one of the attack scenarios plus the average time of the log associated with that newly generated alert to be classified to a certain cluster. Figure 13 depicts the impact of the number of alert and log instances on the average reconstruction time, which smoothly increases as the number of instances increases.

6. Conclusions

In this paper, we proposed the APT alerts and logs correlation method to accomplish the cyber situation comprehension in IoT systems. To appropriately reduce the communication overhead of the proposed method, we provide a framework of deploying APTALCM on the edge computing-based IoT system. To recognize attack intentions, a similarity measures method based on SimRank is provided. We also proposed an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. The experimental results demonstrate that the APTALCM has higher TPR with acceptable FPR.

Author Contributions

Conceptualization, X.C. and B.C.; methodology, X.C.; software, J.Z.; validation, X.C., B.C. and J.Z.; formal analysis, X.C.; investigation, X.C.; resources, X.C.; data curation, B.C.; writing—original draft preparation, X.C.; writing—review and editing, J.Z.; supervision, B.C.; funding acquisition, B.C.

Funding

This research was funded by the National Key Research and Development Program of China, grant number 2017YFB0802303 and the Postgraduate Research & Practice Innovation Program of Jiangsu Province, grant number KYCX18_0308.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Palani, K.; Holt, E.; Smith, S. Invisible and forgotten: Zero-day blooms in the IoT. In Proceedings of the IEEE International Conference on Pervasive Computing & Communication Workshops, Melbourne, Australia, 14–18 March 2016. [Google Scholar]
  2. Xiao, L.; Xu, D.; Xie, C.; Mandayam, N.B.; Vincent Poor, H. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study. IEEE J. Sel. Areas Commun. 2017, 1, 99–109. [Google Scholar] [CrossRef]
  3. Cuppens, F.; Ortalo, R. Lambda: A language to model a database for detection of attacks. In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, 2–4 October 2000; pp. 197–216. [Google Scholar]
  4. Bhatt, P.; Yano, E.T.; Gustavsson, P.M. Towards a framework to detect multi-stage advanced persistent threats attacks. In Proceedings of the IEEE International Symposium on Service Oriented System Engineering, Toronto, ON, Canada, 7–11 April 2014; pp. 390–395. [Google Scholar]
  5. Roschke, S.; Cheng, F.; Meinel, C. A new alert correlation algorithm based on attack graph. CISIS 2017, 6694, 58–67. [Google Scholar]
  6. Albanese, M.; Subrahmanian, V.S. Scalable detection of cyberattacks. CISIM 2016, 245, 9–18. [Google Scholar]
  7. Bass, T. Intrusion detection systems and multisensor data fusion: Creating cyberspace situational awareness. Commun. ACM 2000, 43, 99–105. [Google Scholar] [CrossRef]
  8. Mathew, S.; Upadhyaya, S. Situation awareness of multistage cyber attacks by semantic event fusion. In Proceedings of the Military Communications Conference, London, UK, 29–31 October 2018; pp. 286–1291. [Google Scholar]
  9. Aleroud, A.; Karabatis, G.; Sharma, P.; He, P. Context and semantics for detection of cyber attacks. Int. J. Inf. Comput. Secur. 2014, 6, 63–92. [Google Scholar]
  10. Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence driven computer network defense informed analysis of adversary campaigns intrusion kill chains. In Proceedings of the ICIW, Chicago, IL, USA, 1–3 August 2011; pp. 113–127. [Google Scholar]
  11. Julisch, K. Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inf. Syst. Secur. 2016, 48, 443–471. [Google Scholar] [CrossRef]
  12. Ourston, D.; Matzner, S.; Stump, W. Applications of hidden Markov models to detecting multi-stage network attacks. In Proceedings of the Hawaii International Conference on System Sciences, Big Island, HI, USA, 6–9 January 2016; pp. 73–76. [Google Scholar]
  13. Qiao, L.B.; Zhang, B.F.; Lai, Z.Q.; Su, J.S. Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method. In Proceedings of the IEEE 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Shanghai, China, 21–25 May 2012; pp. 1263–1269. [Google Scholar]
  14. Murphy, C.T.; Yang, S.J. Clustering of multistage cyber attacks using significant services. In Proceedings of the 13th International Conference on Information Fusion IEEE, Edinburgh, UK, 26–29 July 2010; pp. 1–7. [Google Scholar]
  15. Murphy, C.T. CACTUSS: Clustering of Attack Tracks Using Significant Services. Ph.D. Thesis, Rochester Institute of Technology, New York, NY, USA, 2009. [Google Scholar]
  16. Cheng, B.C.; Liao, G.T.; Huang, C.C.; Yu, M.T. A Novel Probabilistic Matching Algorithm for Multi-Stage Attack Forecasts. IEEE J. Sel. Areas Commun. 2011, 29, 1438–1448. [Google Scholar] [CrossRef]
  17. Zhang, Y.; Liu, T.; Shi, J.; Zhang, P.; Zhang, H.; Ya, J. An automatic multistep attack pattern mining approach for massiveWAF alert data. Scanning 2015, 4514, 23–34. [Google Scholar]
  18. Zhang, J.L.; Chen, B.; Zhao, Y.C.; Cheng, X.; Hu, F. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access 2018, 99, 1. [Google Scholar] [CrossRef]
Figure 1. The framework of Cyber Situation Awareness.
Figure 1. The framework of Cyber Situation Awareness.
Sensors 19 04045 g001
Figure 2. The architecture of APTALCM.
Figure 2. The architecture of APTALCM.
Sensors 19 04045 g002
Figure 3. Cyber Situation Comprehension for Internet of Things (IoT) Systems Framework.
Figure 3. Cyber Situation Comprehension for Internet of Things (IoT) Systems Framework.
Sensors 19 04045 g003
Figure 4. The alert instance clusters construction.
Figure 4. The alert instance clusters construction.
Sensors 19 04045 g004
Figure 5. The constructing APT Attack Scenario (AAS) states evolution.
Figure 5. The constructing APT Attack Scenario (AAS) states evolution.
Sensors 19 04045 g005
Figure 6. The pseudo-code of the Alert Instance Correlation Module (AICM) module.
Figure 6. The pseudo-code of the Alert Instance Correlation Module (AICM) module.
Sensors 19 04045 g006
Figure 7. The weighted and directed log instances graph.
Figure 7. The weighted and directed log instances graph.
Sensors 19 04045 g007
Figure 8. The optimization procedure of log instance communities.
Figure 8. The optimization procedure of log instance communities.
Sensors 19 04045 g008
Figure 9. The pseudo-code of Log Instance Correlation Module (LICM) module.
Figure 9. The pseudo-code of Log Instance Correlation Module (LICM) module.
Sensors 19 04045 g009
Figure 10. The TPR varies with data set size changes.
Figure 10. The TPR varies with data set size changes.
Sensors 19 04045 g010
Figure 11. The false-positive rate (FPR) varies with the data set size changes.
Figure 11. The false-positive rate (FPR) varies with the data set size changes.
Sensors 19 04045 g011
Figure 12. Evaluation LICM module detection result; (a) true-positive rate (TPR); (b) FPR.
Figure 12. Evaluation LICM module detection result; (a) true-positive rate (TPR); (b) FPR.
Sensors 19 04045 g012
Figure 13. Computational time varies with the instance quantity changes.
Figure 13. Computational time varies with the instance quantity changes.
Sensors 19 04045 g013
Table 1. The attributes of Advanced Persistent Threat (APT) alert class.
Table 1. The attributes of Advanced Persistent Threat (APT) alert class.
NumberAttributesDescription
1TimestampThe time of the alert occurs
2Alert_TypeThe type of alert
3Src_IpThe source IP of the attack step
4Dest_IpThe destination IP of the attack step
5Src_PortThe source port number of the attack step
6Dest_PortThe destination port number of the attack step
7Victim_HostIpThe IP of the host which victimized by the attack step
Table 2. Logs used for cyber situation perception comprehension.
Table 2. Logs used for cyber situation perception comprehension.
NumberLogsProviders
1HTTPInternet explorer
2Object accessAudit
3DNSTshark
4AuthenticationSyslogd
5Process createAudit
6WFP connectAudit
Table 3. The attributes extracted from log data.
Table 3. The attributes extracted from log data.
NumberLogsAttributeDescription
1Log1-Log6timestampEvent timestamp
2Log3q_domainDNS queried domain name
3Log3r_ipDNS resolved IP address
4Log2 Log5 Log6pidbase-16 process ID
5Log5ppidbase-16 parent process ID
6Log2 Log4 Log5 Log6pnameprocess
7Log6h_ip host IP address
8Log6h_porthost port number
9Log6d_portdestination port number
10Log6d_ipdestination IP address
11Log6typerequest/response
12Log1get_qabsolute path of GET
13Log1post_qabsolute path of POST
14Log1res_coderesponse code
15Log1h_domainhost domain name
16Log1refererrefer of requested URI
17Log1res_loclocation to redirect
18Log2acctprinciple of this access
19Log2objnameobject name
Table 4. The matchup between APT attack scenario steps and alert instances.
Table 4. The matchup between APT attack scenario steps and alert instances.
Step NumberAPT Step Alerts Instance
Step 2(P) Point of entry I ( p 1 ) Domain_instance
I ( p 2 ) Disguised_exe_instance
I ( p 3 ) Hash_instance
Step 3(C) C&C communication I ( c 1 ) Domain_flux_instance
I ( c 2 ) Ip_instance
I ( c 3 ) Ssl_instance
Step 5(A) Asset/Data discoveryI(a1)Scan_instance
Step 6(D) Data exfiltrationI(d1)Tor_intance
Table 5. Evaluation AICM module correlation result.
Table 5. Evaluation AICM module correlation result.
APT Attack ClusterCorrelated QuantityFPTPFNTNNPFPRTPR
APT two steps cluster2*832*352*484483049001001.4%96%
APT three steps cluster3*1063*193*8739464347003001.2%87%
APT full scenario4*1214*104*120120436044006000.9%80%
Total APT cluster9681678371633833400010004.2%83.7%
Table 6. The comparative results between AICM and other APT scenarios reconstruction method.
Table 6. The comparative results between AICM and other APT scenarios reconstruction method.
APT Scenarios Reconstruct MethodEfficiencyStep QuantityFPRTPR
AICM Real-timeFour steps4.2%83.7%
Spear phishing basedReal-timeOne step15.9%94.3%
TerminAPTorReal-timeFour steps25.64%98.8%
C&C-basedOff-lineOne step1.2%79.6%
Table 7. APT log instance size.
Table 7. APT log instance size.
Log QuantitySize (KB)
HTTP334516,530
Object access2825789
Process create2616420
DNS51072
WFP73418,453

Share and Cite

MDPI and ACS Style

Cheng, X.; Zhang, J.; Chen, B. Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation. Sensors 2019, 19, 4045. https://0-doi-org.brum.beds.ac.uk/10.3390/s19184045

AMA Style

Cheng X, Zhang J, Chen B. Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation. Sensors. 2019; 19(18):4045. https://0-doi-org.brum.beds.ac.uk/10.3390/s19184045

Chicago/Turabian Style

Cheng, Xiang, Jiale Zhang, and Bing Chen. 2019. "Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation" Sensors 19, no. 18: 4045. https://0-doi-org.brum.beds.ac.uk/10.3390/s19184045

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop