Paper
15 January 2025 Detecting advanced persistent threats via casual graph neural network
Zhida Guo, Xiaoli Li, Haobin Shen, Xiaolu Zhang, Wanji Wang, Dehua Xie
Author Affiliations +
Proceedings Volume 13516, Fourth International Conference on Network Communication and Information Security (ICNCIS 2024); 135160Z (2025) https://doi.org/10.1117/12.3052125
Event: International Conference on Network Communication and Information Security (ICNCIS 2024), 2024, Hangzhou, China
Abstract
APT attacks are highly dangerous and covert, making them difficult to detect using conventional security measures. Causal analysis based on trace graphs has become a common method for APT detection. However, previous work has encountered several issues, such as the inability to fully utilize contextual information from trace graphs, the requirement for prior records of APT attacks, and excessive computational overhead. This paper proposes an effective self-supervised learning-based method for APT detection. By leveraging provenance graphs and graph representation learning techniques, this method enables multi-granularity detection and effectively accomplishes the task of system anomaly detection. The model adopts outlier detection techniques, enabling APT detection at both the entity level and batch log level. We evaluated our method on three public datasets, and the results demonstrate that our approach achieves optimal detection performance while significantly outperforming existing APT detection methods in terms of computational overhead.
(2025) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Zhida Guo, Xiaoli Li, Haobin Shen, Xiaolu Zhang, Wanji Wang, and Dehua Xie "Detecting advanced persistent threats via casual graph neural network", Proc. SPIE 13516, Fourth International Conference on Network Communication and Information Security (ICNCIS 2024), 135160Z (15 January 2025); https://doi.org/10.1117/12.3052125
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Neural networks

Computer security

Systems modeling

Back to Top