Attack Effect Model based Malicious Behavior Detection

๐Ÿ“… 2025-06-05
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
To address incomplete data coverage, high monitoring overhead, and elevated false-positive rates in security detection, this paper proposes FEAD, a focused attack detection framework. FEAD introduces three key innovations: (1) an attack-effect modelingโ€“driven mechanism for extracting critical security monitoring items, significantly enhancing key event capture; (2) a load-balanced distributed task decomposition strategy to optimize resource scheduling across heterogeneous nodes; and (3) a lightweight anomaly analysis method leveraging the localized clustering property of malicious behaviors in provenance graphs. Experimental evaluation demonstrates that FEAD achieves an 8.23% improvement in F1-score over state-of-the-art approaches while consuming only 5.4% monitoring resource overhead. The framework thus effectively balances detection accuracy, runtime efficiency, and system scalability.

Technology Category

Application Category

๐Ÿ“ Abstract
Traditional security detection methods face three key challenges: inadequate data collection that misses critical security events, resource-intensive monitoring systems, and poor detection algorithms with high false positive rates. We present FEAD (Focus-Enhanced Attack Detection), a framework that addresses these issues through three innovations: (1) an attack model-driven approach that extracts security-critical monitoring items from online attack reports for comprehensive coverage; (2) efficient task decomposition that optimally distributes monitoring across existing collectors to minimize overhead; and (3) locality-aware anomaly analysis that leverages the clustering behavior of malicious activities in provenance graphs to improve detection accuracy. Evaluations demonstrate FEAD achieves 8.23% higher F1-score than existing solutions with only 5.4% overhead, confirming that focus-based designs significantly enhance detection performance.
Problem

Research questions and friction points this paper is trying to address.

Improves detection by extracting critical monitoring items from attack reports
Reduces overhead via optimal task distribution across existing collectors
Enhances accuracy using locality-aware anomaly analysis in provenance graphs
Innovation

Methods, ideas, or system contributions that make the work stand out.

Attack model-driven critical monitoring extraction
Efficient task decomposition minimizes overhead
Locality-aware anomaly analysis improves accuracy
๐Ÿ”Ž Similar Papers
No similar papers found.
L
Limin Wang
State Key Laboratory of Novel Software Techniques, Nanjing University, Nanjing, Jiangsu 210023, China
Lei Bu
Lei Bu
Nanjing University
Model CheckingHybrid SystemCyber-Physical SystemFormal Verification
M
Muzimiao Zhang
State Key Laboratory of Novel Software Techniques, Nanjing University, Nanjing, Jiangsu 210023, China
S
Shihong Cang
State Key Laboratory of Novel Software Techniques, Nanjing University, Nanjing, Jiangsu 210023, China
K
Kai Ye
State Key Laboratory of Novel Software Techniques, Nanjing University, Nanjing, Jiangsu 210023, China