Hopper: Modeling and Detecting Lateral Movement (Extended Report)
In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopp...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In successful enterprise attacks, adversaries often need to gain access to
additional machines beyond their initial point of compromise, a set of internal
movements known as lateral movement. We present Hopper, a system for detecting
lateral movement based on commonly available enterprise logs. Hopper constructs
a graph of login activity among internal machines and then identifies
suspicious sequences of loginsthat correspond to lateral movement. To
understand the larger context of each login, Hopper employs an inference
algorithm to identify the broader path(s) of movement that each login belongs
to and the causal user responsible for performing a path's logins. Hopper then
leverages this path inference algorithm, in conjunction with a set of detection
rules and a new anomaly scoring algorithm, to surface the login paths most
likely to reflect lateral movement. On a 15-month enterprise dataset consisting
of over 780 million internal logins, Hop-per achieves a 94.5% detection rate
across over 300 realistic attack scenarios, including one red team attack,
while generating an average of |
---|---|
DOI: | 10.48550/arxiv.2105.13442 |