MARC보기
LDR00000nam u2200205 4500
001000000434250
00520200226143214
008200131s2019 ||||||||||||||||| ||eng d
020 ▼a 9781085634700
035 ▼a (MiAaPQ)AAI13881374
040 ▼a MiAaPQ ▼c MiAaPQ ▼d 247004
0820 ▼a 614
1001 ▼a Gao, Peng.
24510 ▼a Effective and Efficient Forensic Analysis via System Monitoring.
260 ▼a [S.l.]: ▼b Princeton University., ▼c 2019.
260 1 ▼a Ann Arbor: ▼b ProQuest Dissertations & Theses, ▼c 2019.
300 ▼a 167 p.
500 ▼a Source: Dissertations Abstracts International, Volume: 81-03, Section: A.
500 ▼a Advisor: Mittal, Prateek
5021 ▼a Thesis (Ph.D.)--Princeton University, 2019.
506 ▼a This item must not be sold to any third party vendors.
520 ▼a Advanced Persistent Threat (APT) attacks and data breaches are sophisticated and stealthy, plaguing many well-protected businesses (e.g., Target, Yahoo, Home Depot, eBay, Equifax, Marriott, etc.) with significant losses. To counter these advanced attacks, approaches based on ubiquitous system monitoring have emerged as an important solution for monitoring system activities from enterprise hosts and performing forensic analysis. System monitoring audits system calls at the kernel level to collect information about system activities, providing a global view of interactions among applications and system resources. Collection of system monitoring data enables security analysts to identify the root causes and the ramifications of attacks (i.e., attack investigation) and to detect the abnormal behaviors of attacks (i.e., attack detection). However, the daunting amount of system monitoring data and the complexity of advanced attacks pose significant challenges for designing solutions for effective and efficient forensic analysis.In this thesis, we propose novel approaches for effective and efficient forensic analysis (attack investigation and attack detection) via system monitoring. First, we propose AIQL, a system that enables efficient post-mortem attack investigation via querying the historical system monitoring data. Second, we propose SAQL, a system that enables real-time abnormal system behavior detection via querying the stream of system monitoring data. Both AIQL and SAQL provide (1) domain-specific languages that uniquely integrate critical primitives for easily incorporating the domain knowledge of security experts to express a wide range of attack behaviors, and (2) query execution engines that employ novel optimizations based on the domain-specific characteristics of the system monitoring data and the semantics of the query for efficient query execution. Finally, we propose SysRep, a system that facilitates automatic attack investigation via (1) propagating reputation from seed sources (can be trusted or suspicious) along system dependency paths to infer the reputation of POI (point of interest) entities (e.g., files, network sockets), and (2) automatically reconstructing the attack sequence from POI entities. Together, AIQL, SAQL, and SysRep work seamlessly for effective and efficient forensic analysis of APT attacks.
590 ▼a School code: 0181.
650 4 ▼a Computer science.
650 4 ▼a Forensic anthropology.
690 ▼a 0984
690 ▼a 0339
71020 ▼a Princeton University. ▼b Electrical Engineering.
7730 ▼t Dissertations Abstracts International ▼g 81-03A.
773 ▼t Dissertation Abstract International
790 ▼a 0181
791 ▼a Ph.D.
792 ▼a 2019
793 ▼a English
85640 ▼u http://www.riss.kr/pdu/ddodLink.do?id=T15491186 ▼n KERIS ▼z 이 자료의 원문은 한국교육학술정보원에서 제공합니다.
980 ▼a 202002 ▼f 2020
990 ▼a ***1816162
991 ▼a E-BOOK