Skip to main content

Showing 1–5 of 5 results for author: Milajerdi, S M

Searching in archive cs. Search in all archives.
.
  1. POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting

    Authors: Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan

    Abstract: Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might have compromised an enterprise network for a long time without being discovered. To have a more effective analysis, CTI open standards have incorporated descriptive relationships showing how the indicators or observables are related to each other. However, these relationships are either completely overlook… ▽ More

    Submitted 30 September, 2019; originally announced October 2019.

    Comments: The final version of this paper is going to appear in the ACM SIGSAC Conference on Computer and Communications Security (CCS'19), November 11-15, 2019, London, United Kingdom

  2. arXiv:1810.05711  [pdf, other

    cs.CR

    ProPatrol: Attack Investigation via Extracted High-Level Tasks

    Authors: Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan

    Abstract: Kernel audit logs are an invaluable source of information in the forensic investigation of a cyber-attack. However, the coarse granularity of dependency information in audit logs leads to the construction of huge attack graphs which contain false or inaccurate dependencies. To overcome this problem, we propose a system, called ProPatrol, which leverages the open compartmentalized design in familie… ▽ More

    Submitted 12 October, 2018; originally announced October 2018.

    Comments: The published version of this article will appear in proceedings of the 14th International Conference on Information Systems Security in Dec 2018

  3. arXiv:1810.01594  [pdf, other

    cs.CR

    HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows

    Authors: Sadegh M. Milajerdi, Rigel Gjomemo, Birhanu Eshete, R. Sekar, V. N. Venkatakrishnan

    Abstract: In this paper, we present HOLMES, a system that implements a new approach to the detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case studies of real-world APTs that highlight some common goals of APT actors. In a nutshell, HOLMES aims to produce a detection signal that indicates the presence of a coordinated set of activities that are part of an APT campaign. On… ▽ More

    Submitted 17 January, 2019; v1 submitted 3 October, 2018; originally announced October 2018.

    Comments: The final version of this paper will appear in the proceedings of the 40th IEEE Symposium on Security and Privacy in May 2019 (https://www.ieee-security.org/TC/SP2019/)

  4. arXiv:1801.02062  [pdf, other

    cs.CR

    SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data

    Authors: Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, VN Venkatakrishnan

    Abstract: We present an approach and system for real-time reconstruction of attack scenarios on an enterprise host. To meet the scalability and real-time needs of the problem, we develop a platform-neutral, main-memory based, dependency graph abstraction of audit-log data. We then present efficient, tag-based techniques for attack detection and reconstruction, including source identification and impact anal… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: 26th USENIX Security Symposium (USENIX Security 2017)

  5. arXiv:1707.02520  [pdf, other

    cs.CR

    A Composite-Metric Based Path Selection Technique for the Tor Anonymity Network

    Authors: Sadegh Momeni Milajerdi, Mehdi Kharrazi

    Abstract: The Tor anonymous network has become quite popular with regular users on the Internet. In the Tor network, an anonymous path is created by selecting three relays through which the connection is redirected. Nevertheless, as the number of Tor users has increased substantially in recent years, the algorithm with which the relays are selected affects the performance provided by the Tor network. More i… ▽ More

    Submitted 8 July, 2017; originally announced July 2017.

    Comments: Journal of Systems and Software 2015