ODR kommer att vara otillgängligt pga systemunderhåll onsdag 25 februari, 13:00 -15:00 (ca). Var vänlig och logga ut i god tid. // ODR will be unavailable due to system maintenance, Wednesday February 25, 13:00 - 15:00. Please log out in due time.
 

Leveraging Root Cause Analysis for Mimicry Attack Detection

dc.contributor.authorKVALDÉN, SEBASTIAN
dc.contributor.authorHENRIKSSON, ERIK
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data och informationstekniksv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineeringen
dc.contributor.examinerAli-Eldin Hassan, Ahmed
dc.contributor.supervisorDuvignau, Romaric
dc.date.accessioned2026-01-16T09:09:50Z
dc.date.issued2025
dc.date.submitted
dc.description.abstractCyber attacks are a constant threat to all computer systems, and there are many different approaches to detecting attacks in real-time. One such approach is a Host- Based Intrusion Detection System (HIDS), which detects threats on a single host machine. A recent addition to HIDS is Provenance-Graphs [1], [2], which creates a representation of the flow of all system calls. Many of these systems condense the provenance data for increased space efficiency. This, however, creates a vulnerability for a type of evasion attack called Mimicry Attack. Mimicry Attacks work by copying benign sequences of system calls and injecting them into the attack to mask their malicious intent. This thesis aims to combat this vulnerability by incorporating coarse-grained Root Cause Analysis (RCA) into Provence-Graph-based HIDSs (Prov-HIDS). Earlier attempts at fine-grained RCA, where the analysis is done on the process level, have been successful in detecting Mimicry Attacks. These solutions have, however, had significant overhead, consuming most of the host’s resources [3]. The thesis aims to combat this issue by utilising the summarisation approach of coarse-grained detection models on the system’s root nodes. This solution increases the context for the classification models during threat detection. The detection accuracy increased from 13.4% for the Unicorn Prov-HIDS to 99.5% with the RCA implementation, when evaluated against the StreamSpot dataset. With only a 4.97% increase in execution time and a 2.17% peak memory consumption increase. However, the RCA implementation also caused issues with misclassification of benign data. The findings also raise concerns about the reliability of existing datasets. To address these challenges, new dataset criteria are proposed, and the development of a new, high-quality dataset is essential to advance research in this field.
dc.identifier.coursecodeDATX05
dc.identifier.urihttp://hdl.handle.net/20.500.12380/310906
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectMimicry Attack
dc.subjectHIDS
dc.subjectProv-HIDS
dc.subjectRoot Cause Analysis
dc.subjectAPT
dc.subjectProvenance Graph
dc.titleLeveraging Root Cause Analysis for Mimicry Attack Detection
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster's Thesisen
dc.type.uppsokH
local.programmeComputer systems and networks (MPCSN), MSc

Ladda ner

Original bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
CSE 25-143 SK EH.pdf
Storlek:
10.96 MB
Format:
Adobe Portable Document Format

License bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
license.txt
Storlek:
2.35 KB
Format:
Item-specific license agreed upon to submission
Beskrivning: