Anomaly Detection for Advanced Persistent Threats With Graph Node Embedding

Zhe Heng Peng, Chang Zhen Hu, Chun Shan*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In recent years, Advanced Persistent Threat (APT) attacks have increasingly become a menace to national cybersecurity. Due to their complex tactics and persistent nature, traditional anomaly detection methods make it difficult to detect APT attacks effectively. The provenance graph is now widely adopted for APT attack analysis because it possesses greater semantic expression, provenance, and causation abilities. However, many current anomaly detection methods, grounded in provenance graphs and network attack knowledge bases, face inherent complexities in design. Moreover, these methods mainly harness features from the entire provenance graph and overlook the rich semantic intricacies within its architecture, which diminishes their efficacy in spotting anomalous nodes. This research introduces an innovative anomaly detection method for provenance graphs, utilizing heterogeneous graph node embedding and clustering analysis. Drawing from the W3CPROV’s PROV-DM model, we craft a distinct heterogeneous graph structure. We design a new meta-path strategy for better semantic understanding. By employing a heterogeneous graph learning algorithm, we obtain node embeddings. We use K-means clustering to classify benign nodes to get multiple clusters, and then use the benign node clusters to accurately differentiate between benign and anomalous nodes. Experimental validations on the Unicorn SC-2 dataset and the DARPA TC dataset confirm that our approach has better anomaly detection capacity compared to two current anomaly detection systems.

Original languageEnglish
Pages (from-to)713-728
Number of pages16
JournalJournal of Information Science and Engineering
Volume41
Issue number3
DOIs
Publication statusPublished - May 2025
Externally publishedYes

Keywords

  • anomaly detection
  • cluster analysis
  • graph node embedding
  • heterogeneous graph neural network
  • provenance graph

Fingerprint

Dive into the research topics of 'Anomaly Detection for Advanced Persistent Threats With Graph Node Embedding'. Together they form a unique fingerprint.

Cite this