Wenhan Jiang, Tingting Chai, Hongri Liu et al. (5 total)
2025-01-13
ArXiv Vol. abs/2501.06997
10.48550/arxiv.2501.06997
摘要
Advanced Persistent Threat (APT) have grown increasingly complex and concealed, posing formidable challenges to existing Intrusion Detection Systems in identifying and mitigating these attacks. Recent studies have incorporated graph learning techniques to extract detailed information from provenance graphs, enabling the detection of attacks with greater granularity. Nevertheless, existing studies have largely overlooked the continuous yet subtle temporal variations in the structure of provenance...
The research addresses the challenge of detecting Advanced Persistent Threats (APTs) that are increasingly complex and concealed. Existing intrusion detection systems often overlook subtle temporal variations in provenance graphs, hindering accurate identification and mitigation of these attacks.
The study introduces TFLAG, a self-supervised anomaly detection framework. TFLAG integrates temporal graph models for structural dynamic extraction with deviation networks for anomaly delineation. This framework identifies covert attack activities in provenance graphs by analyzing neighbor interaction data.
Experimental results demonstrate that TFLAG accurately identifies time windows associated with APT attack behaviors without prior knowledge. It outperforms state-of-the-art methods in differentiating between attack events and system false positives by utilizing both attribute and temporal information.