A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots

Authors

  • Muhammed AbuOdeh University of Georgia
  • Christian Adkins University of Georgia
  • Omid Setayeshfar University of Georgia
  • Prashant Doshi University of Georgia
  • Kyu H. Lee University of Georgia

DOI:

https://doi.org/10.1609/aaai.v35i17.17786

Keywords:

Attack Phases, Cyber Forensics, Machine Learning, Methodology

Abstract

We present a novel AI-based methodology that identifies phases of a host-level cyber attack simply from system call logs. System calls emanating from cyber attacks on hosts such as honey pots are often recorded in audit logs. Our methodology first involves efficiently loading, caching, processing, and querying system events contained in audit logs in support of computer forensics. Output of queries remains at the system call level and is difficult to process. The next step is to infer a sequence of abstracted actions, which we colloquially call a storyline, from the system calls given as observations to a latent-state probabilistic model. These storylines are then accurately identified with class labels using a learned classifier. We qualitatively and quantitatively evaluate methods and models for each step of the methodology using 114 different attack phases collected by logging the attacks of a red team on a server, on some likely benign sequences containing regular user activities, and on traces from a recent DARPA project. The resulting end-to-end system, which we call Cyberian, identifies the attack phases with a high level of accuracy illustrating the benefit that this machine learning-based methodology brings to security forensics.

Downloads

Published

2021-05-18

How to Cite

AbuOdeh, M., Adkins, C., Setayeshfar, O., Doshi, P., & Lee, K. H. (2021). A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots. Proceedings of the AAAI Conference on Artificial Intelligence, 35(17), 15224-15231. https://doi.org/10.1609/aaai.v35i17.17786

Issue

Section

IAAI Technical Track on Emerging Applications of AI