1. Field of the Invention
The present invention relates generally to computer security, and more particularly but not exclusively to methods and apparatus for detecting advanced persistent threats.
2. Description of the Background Art
Advanced persistent threat (APT) is a type of cyber attack that is tailored to a particular target, which is typically an organization, such as a business or government. Compared to mass attacks, an APT attack is very sophisticated and typically includes several stages. First, the attacker performs information gathering on the target. From the gathered information, the attacker identifies a vulnerability to gain entry into the target's computer network and create a back door that allows communication with an APT command and control server. The attacker then roams the network to obtain higher level permissions (e.g., passwords to critical assets) and to find confidential data, such as intellectual property data, financial data, personally identifiable information, etc. The attacker transfers the confidential data out of the target's computer network and may even cover his tracks, such as by deleting programs used to perpetrate the APT attack.
In one embodiment, a system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network. The critical asset may be a computer that stores confidential data of the organization. Access events may be stored in an event log as event data. Access events indicated in the event log may be correlated using a set of alert rules to identify an APT attack.
These and other features of the present invention will be readily apparent to persons of ordinary skill in the art upon reading the entirety of this disclosure, which includes the accompanying drawings and claims.
The use of the same reference label in different drawings indicates the same or like components.
In the present disclosure, numerous specific details are provided, such as examples of apparatus, components, and methods, to provide a thorough understanding of embodiments of the invention. Persons of ordinary skill in the art will recognize, however, that the invention can be practiced without one or more of the specific details. In other instances, well-known details are not shown or described to avoid obscuring aspects of the invention.
The inventors believe that traditional solutions for detecting network intrusions and malware (e.g., computer viruses, Trojans, worms) are ineffective against APT attacks because an APT attack typically involves activities that at a glance appear to be normal. As a particular example, an APT attack may be initiated by sending a so-called “spear fishing email” that targets low-level personnel who have access to the network. The spear phishing email may allow the attacker, i.e., cybercriminal or software perpetrating the APT attack, only limited access to the network using the credentials of low-level personnel. However, once on the network, the attacker may roam the network to find credentials of higher-level personnel and discover network paths to other computers on the network. This stage of the APT attack is also referred to as “lateral movement” and is relatively difficult to detect because the corresponding network activity of the attacker appears to be normal or authorized. The following stage of the APT attack where the attacker looks for sensitive data, which is referred to as “data discovery”, is also relatively difficult to detect for the same reason.
Referring now to
The computer 100 is a particular machine as programmed with software modules 110. The software modules 110 comprise computer-readable program code stored non-transitory in the main memory 108 for execution by the processor 101. As an example, the software modules 110 may comprise software modules for detecting an APT attack when the computer 100 is employed as an APT detection server.
The computer 100 may be configured to perform its functions by executing the software modules 110. The software modules 110 may be loaded from the data storage device 106 to the main memory 108. An article of manufacture may be embodied as computer-readable storage medium including instructions that when executed by the computer 100 causes the computer 100 to be operable to perform the functions of the software modules 110.
In the example of
In the example of
In one embodiment, a network sensor 131 is configured to receive network traffic, parse the network traffic for event data that indicates access events involving critical assets, and forward the event data to the APT detection server 140. The critical assets may comprise computers that store confidential data, such as servers that contain intellectual property data and personal computers of high-level personnel (e.g., president, network administrator, chief technical officer). For example, a network sensor 131 may receive network packets and parse the network packets to identify network packets having destination and/or origin (i.e., sending) addresses of critical assets. The network sensor 131 may forward to the APT detection server 140 the identified network packets along with other related information, such as timestamps, routing information, etc., as event data. In one embodiment, the network sensor 131 may provide the event data in a format that may be readily stored in and read from an event log.
In one embodiment, the APT detection server 140 comprises one or more computers that receive event data from network sensors 131, process the event data to adjust a set of alert rules, and to correlate the event data using the set of alert rules to identify an APT attack. In the example of
In the example of
In the example of
The network sensor 131 may be running on a file server computer that is designated as a critical asset. In that example, the network sensor 131 may monitor and record access to the file server computer. As another example, the network sensor 131 may be running on a router 133; in that case the network sensor 131 may parse network packets passing through the router 133 to identify events involving access to critical assets. The network sensor 131 may format identified events into event data, which the network sensor 131 transmits to the APT detection server 140 (see arrow 302).
Continuing with
In one embodiment, the APT detection server 140 comprises an event log 331, an adjustment module 332, a set of alert rules 334, and a correlator 335. In the example of
In one embodiment, the adjustment module 332 comprises one or more software- or hardware-based tools for reading, viewing, and extracting parameter data for one or more rules of the set of alert rules 334. The adjustment module 332 may be employed by antivirus researchers or programs (e.g., scripts) to extract from the event log 331 data that may be used to define parameters for the set of alert rules 334, such as data that identify critical assets, the roles of users of the critical assets, the behavior of users of the critical assets, and when the critical assets are accessed.
In one embodiment, the set of alert rules 334 comprises one or more rules for identifying an APT attack. In the example of
In the example of
In the example of
In the example of
In the example of
In the example of
Prior to normal operation wherein the system of
During normal operation, the correlator 335 may be placed online to scan the event log 331 for entries indicating access to a critical asset (see arrow 305). The correlator 335 may consult the set of alert rules 334 to determine whether the access to the critical asset is normal or anomalous. For example, the correlator 335 may scan the event log 331 to identify event data indicating access to a critical asset (as per critical assets rules 340) outside its normal access time (as per schedule definition 343). The correlator 335 may base its decision on a particular event data or several event data. For example, in the just mentioned example, while access to a critical asset outside its normal access time may not be conclusive enough to declare the access to be an APT attack activity, that event coupled with another access event indicating that the same critical asset is accessed by an unauthorized user (per the role based definition rules 341) after several login failures (as per other event data in the event log 331) may indicate anomalous access to the critical asset.
In one embodiment, the correlator 335 deems anomalous access to a critical asset to be a possible APT attack. In that case, the correlator 335 may alert an administrator or other authorized personnel about the anomalous access. The correlator 335 may send an alert by sending an email, displaying a message box, text messaging, raising an audible alarm, etc. The alert may be used to initiate an investigation of the anomalous access, raise security-levels (e.g., temporarily prevent access to critical assets) to prevent or minimize damage from an APT attack in progress, or initiate other responses for dealing with an APT attack.
Systems and methods for detecting an APT attack on a private computer network have been disclosed. While specific embodiments of the present invention have been provided, it is to be understood that these embodiments are for illustration purposes and not limiting. Many additional embodiments will be apparent to persons of ordinary skill in the art reading this disclosure.
Number | Name | Date | Kind |
---|---|---|---|
6202158 | Urano | Mar 2001 | B1 |
8069372 | Natvig | Nov 2011 | B2 |
9111088 | Ghai | Aug 2015 | B2 |
9185095 | Moritz | Nov 2015 | B1 |
20040044912 | Connary | Mar 2004 | A1 |
20060064598 | Higashikado | Mar 2006 | A1 |
20070039049 | Kupferman | Feb 2007 | A1 |
20070118350 | van der Made | May 2007 | A1 |
20110238855 | Korsunsky | Sep 2011 | A1 |
20130117006 | Varghese et al. | May 2013 | A1 |
20130117848 | Golshan et al. | May 2013 | A1 |
20140298461 | Hohndel | Oct 2014 | A1 |
20150033227 | Lin et al. | Jan 2015 | A1 |
Entry |
---|
Http://searchsecurity.techtarget.com/definition/advanced-persistent-threat-ADT, Nov. 2010. pp. 1-4. |
Sandboxie—Wikipedia, the free encyclopedia, 2 sheets [retrieved on Jul. 2, 2013], retrieved from the internet: http://en.wikipedia.org/wiki/Sandboxie. |
Sandboxie—Sandbox software for application isolation and secure Web browsing, 3 sheets [retrieved on Jul. 17, 2013], retrieved from the internet: http://www.sandboxie.com/. |
Advanced persistent threat—Wikipedia, the free encyclopedia, 4 sheets [retrieved on Jul. 17, 2013], retrieved from the internet: http://en.wikipedia.org/wiki//Advanced_persistent_threat. |
VMware VMotion Live migration of virtual machines without service interuption, 2 sheets, webpage [online][retrieved on Jun. 3, 2009], retrieved from the internet: http://www.vmware.com/files/pdf/vmotion_datasheet.pdf. |
Interop Labs What is Cisco NAC?, 2 sheets, [retrieved on Jun. 3, 2009], retrieved from the internet: http://www.interop.com/archive/pdfs/2007-06WhatIsCiscoNAC.pdf. |
VMware VSphere Live migration of virtual machines, 2 sheets, webpage [online][retrieved on Jun. 3, 2009], retrieved from the internet: http://www.vmware.com/products/vi/vc/vmotion.html. |
Cisco Systems—Cisco Network Admission Control (NAC), 2 sheets, webpage [online][retrieved on Jun. 3, 2009], retrieved from the internet: http://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html. |
Cisco NAC Appliance—Wikipedia, the free encyclopedia, 5 sheets [retrieved on Jun. 3, 2009], retrieved from the internet: http://en.wikipedia.org/wiki/Clean_Access_Agent. |
Microsoft About NAP (Windows), 1 sheet, webpage [online][retrieved on Jun. 3, 2009], retrieved from the internet: http://msdn.microsoft.co/en-us/library/aa369143(VS.85).aspx. |
Java virtual machine—Wikipedia, the free encyclopedia, 8 sheets [retrieved on Jan. 6, 2012], retrieved from the internet: http://en.wikipedia.org/wiki/Java_virtual_machine. |
Java.security Class AllPermission (Java 2 Platform SE v1.4.2), 5 sheets [retrieved on Jan. 6, 2012], retrieved from the internet: http://docs.oracle.com/javase/1.4.2./docs/api/java/security/AllPermission.html. |
Qin Li, et al. “HyperMIP: Hypervisor controlled Mobile IP for Virtual Machine Live Migration across Networks”, 2008, pp. 80-88, 11th IEEE High Assurance Systems Engineering Symposium. |
Koichi Onoue, et al. “A Virtual Machine Migration System Based on a CPU Emulator”, 2006, pp. 1-8, IEEE 2nd International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006). |
Number | Date | Country | |
---|---|---|---|
20170099306 A1 | Apr 2017 | US |