Alert-Driven Attack Graph Generation Using S-PDFA
Alert-Driven Attack Graph Generation Using S-PDFA
Abstract—Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation.
Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical
representation, often referred to as an attack graph (AG). Instead of deriving AGs based on system vulnerabilities, this work advocates the
direct use of intrusion alerts. We propose SAGE, an explainable sequence learning pipeline that automatically constructs AGs from intrusion
alerts without a priori expert knowledge. SAGE exploits the temporal and probabilistic dependence between alerts in a suffix-based
probabilistic deterministic finite automaton (S-PDFA) — a model that brings infrequent severe alerts into the spotlight and summarizes paths
leading to them. Attack graphs are extracted from the model on a per-victim, per-objective basis. SAGE is thoroughly evaluated on three
open-source intrusion alert datasets collected through security testing competitions in order to analyze distributed multi-stage attacks.
SAGE compresses over 330k alerts into 93 AGs that show how specific attacks transpired. The AGs are succinct, interpretable, and provide
directly relevant insights into strategic differences and fingerprintable paths. They even show that attackers tend to follow shorter paths after
they have discovered a longer one in 84.5% of the cases.
Index Terms—Alert-driven attack graphs, explainable machine learning, suffix automaton model, attacker strategy, intrusion alerts
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
732 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
Fig. 1. SAGE takes intrusion alerts as input and generates attack graphs. Intrusion alerts are transformed into episode sequences (Section 4.1). An
interpretable S-PDFA model is learned from those sequences (Section 4.2). The sequences are replayed through the S-PDFA and transformed into
targeted attack graphs (Section 4.3).
learning algorithm and transform the alert data such that the discarding any low-severity alerts. The model summa-
resulting model accentuates infrequent severe alerts, with- rizes attack paths in the dataset.
out discarding any low-severity alerts. The model summa- 2) We provide formal definitions for SAGE’s compo-
rizes attack paths leading to severe attack stages. It can nents, including a thorough explainability analysis
distinguish between alerts with the same signature but dif- of SAGE and the alert-driven AGs it generates.
ferent contexts, i.e., scanning at the start and scanning mid- 3) We utilize three security testing competition datasets
way through an attack are treated differently, since the to extensively evaluate SAGE. We show it is general-
former indicates reconnaissance and the latter indicates izable and the AGs provide actionable intelligence
attack progression. Targeted attack graphs are extracted regarding attacker strategies, strategic differences,
from the S-PDFA on a per-victim, per-objective basis. and fingerprintable paths.
We demonstrate SAGE’s effectiveness on distributed Section 2 describes two practical use-cases for SAGE. We
multi-stage attack scenarios, i.e., where multiple attackers provide a brief overview of the related works in Section 3.
collaborate to compromise various targets progressing The architecture of SAGE, along with its explainability
through numerous attack stages. Discovering attacker strate- aspect is illustrated in Section 4. Sections 5 and 6 describe
gies in this setting is inherently difficult because host infor- the experimental setup and a thorough analysis of alert-
mation cannot be used to aggregate alerts from different driven attack graphs. We discuss the limitations of SAGE in
collaborating attacker(s). Security testing competitions pro- Section 7 and conclude in Section 8.
vide an ideal setting to study such attacks in a controlled set-
ting. To this end, we use three open-source datasets collected
through penetration testing competitions [20] and blue team 2 USE-CASES FOR SAGE
exercises [21] that have significantly different statistical SAGE uses intrusion alerts to generate attack graphs (AG)
properties and target infrastructures. that succinctly display all the paths that reach a given objec-
On one of the datasets, SAGE compresses over 330k tive, making it an interpretable visual analytics tool. Below,
alerts into 93 AGs in under a minute. Even with an imper- we highlight use-cases for two types of users.
fect IDS, the AGs capture the strategies used by the partici- SOC Analysts. The primary use-case explored in this
pating teams. They reveal that 84.5% of the time, attackers paper is about enabling SOC analysts extract threat intelli-
follow a shorter path to re-exploit an objective, after they gence about attacker strategies from previously observed
have already discovered a longer path. Moreover, the AGs malicious activities. As such, SAGE augments existing
provide the visual means to compare attacker strategies. We SIEMs and IDSs by triaging the attack scenarios of interest,
show how to use this comparison to find fingerprintable e.g., for specific assets in a network. The selected alert-driven
paths and to rank various attackers based on the severity of AGs can be analyzed and attacker strategies can be derived
their actions. Finally, SAGE is agnostic to the specific inner for corroborating specific evidences. Sections 6.1.1 and 6.1.2
workings of an IDS, and can process any alert dataset as discuss concrete examples of interpreting and comparing
long as it contains IP addresses, port-numbers, and a attacker strategies. The occurrence of certain paths in an AG
description of the observed attack event. Our main contri- can serve as fingerprints (see Section 6.1.3). Additionally,
butions are: attacker hosts can be ranked based on the severity of alerts
they raise (see Section 6.1.4).
1) We propose suffix-based probabilistic deterministic Red Teams. As an adversarial use-case, SAGE can act as a
finite automaton (S-PDFA), an interpretable sequence monitoring intermediary during red team training. After a
model that focuses on infrequent severe alerts without training session, the teams review alert-driven AGs for
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 733
gaining intelligence, such as (i) identifying the shortest path to Explainability. SAGE provides an explainable and auto-
an objective that was discovered by a team member, or (ii) mated alternative to the manual process of finding attacker
showing redundant paths, for instance, due by lack of com- strategies. It is important to note that while explainability is
munication between the team members. Enumerating all widely considered for classification decisions, SAGE is not a
paths toward an objective can help the teams develop creative classifier, and the explainability lies in the attack graphs
strategies (example in Section 6.3). Teams can use such feed- instead. Because the explainability aspect of SAGE is an
back to further improve their performance. important design consideration, we do not consider inher-
ently black-box models, such as neural networks [43]. While
attention mechanisms [44] and linear proxy models [45] help
3 RELATED WORK explain the decisions of such black-box models, they offer
Cyber Threat Intelligence. CTI refers to evidence-based situa- post-hoc interpretability on a per-input basis. Instead, SAGE
tional awareness, which typically involves insights into the relies on the interpretable nature of its entire pipeline. As
tactics, techniques, and strategies employed by cyber adver- opposed to black-box models that often make use of random-
saries [22]. Intrusion detection systems (IDS) generate thou- ization and soft decision boundaries to avoid local minima
sands of alerts on a daily-basis. Alert triaging techniques and over-fitting, SAGE relies on statistical tests, making
have been proposed to model attack scenarios, such as alert every step in its pipeline discrete and deterministic . In addi-
correlation [3], [4], [5], [23], [24], [25], [26], [27] and alert pri- tion to model interpretability , this provides design- and algo-
oritization [28], [29]. Alert correlation groups alerts from the rithmic transparency . We make conscious design decisions to
same attack stage, while alert prioritization highlights and enhance the interpretability of the S-PDFA, and the way the
summarizes alerts for speeding up the response time. attack graphs are constructed makes them explainable.
Although these methods drastically reduce alert volume, These notions are described by Roscher et al. [46], who list
they do not provide a bigger picture of the specific strategies the three components of explainable machine learning as:
employed by the attackers. transparency , interpretability , and explainability . In short,
Attack Graph Generation. SOC analysts rely on labor- interpretability is about the model, while explainability is
intensive processes for obtaining intelligence regarding about the output of a learning pipeline. Model interpretability
attacker strategies. Attack graphs (AG) provide a concise allows a user to: 1) examine (visualize) a learned model, 2)
way of displaying these strategies [8], [14]. Specifically in reason about the discovered patterns, 3) draw inferences,
the network security domain, Kaynar et al. [30] have and 4) combine it with subsequent analysis methods. A
proposed a taxonomy of the existing AG generation model is design transparent if design decisions can be moti-
approaches. Many of them fall under the topological vul- vated from the application domain, and it is algorithmically
nerability analysis (TVA) [11], which relies heavily on a transparent if it allows a user to reverse the learning pipeline
priori knowledge about the topology of, and vulnerabil- to obtain the input data that led to modeling decisions. We
ities in a network, making them unsuitable for zero-day show examples of all of these in Sections 4.4 and 6.1.
attacks. MulVAL [12] and NetSPA [13] are popular tools in
this category. Next to this, there are many approaches to 4 SAGE: INTRUSION ALERT-DRIVEN ATTACK
improve pre-existing AGs, e.g., works focusing on AG GRAPH EXTRACTOR
completeness [31], [32], AG complexity reduction [33],
[34], and what-if analyses [6], [7]. SAGE (IntruSion alert-driven Attack Graph Extractor) is a
Learning From Observables. Cyber data from prior security purely alert-driven approach for attack graph generation.
incidents can be utilized to gain insights into attacker SAGE has 3 core components, as shown in Fig. 1. It takes raw
behavior, e.g., using log data [35], [36], [37], sensor intrusion alerts as input, aggregates them into sequences of
data [38], and network traffic [39]. Process mining and Mar- attacker actions. An automaton model is learned using these
kov models are particularly well-suited for sequential learn- sequences, summarizing attacker strategies. Finally, attack
ing problems. Process mining (PM) has been used to graphs are extracted from the model on a per-victim, per-
provide a visual summary of the intrusion alert datasets [40], objective basis. SAGE is released as open-source1. It is imple-
[41]. While great for modeling concurrent events, PM mod- mented in Python and released in a docker container for
els are dense and cannot be used to model context: they use cross-platform support.
alert signatures as identifiers, which makes it impossible to In this section, we use the Collegiate Penetration Testing
distinguish between alerts with different contexts but iden- Competition dataset from 2018 [47], i.e., CPTC-2018, as a
tical signatures. Markov models, however, have no such running example. CPTC-2018 contains intrusion alerts gen-
limitation. Moskal et al. [42] use suffix-based Markov chains erated by six teams (T1, T2, T5, T7, T8, T9) attempting to
to represent attacker strategies as sequences of hyper-alerts. compromise the infrastructure of a fictitious automotive
They measure attack sequence similarity using Jensen-Shan- company (See Section 5 for details). Table 1 shows how the
non divergence. In this paper, we propose SAGE, which is a volume of alerts is reduced by each component of SAGE.
purely alert-driven approach for generating attack graphs.
We borrow initial ideas from Moskal et al. [42]. We leverage 4.1 From Intrusion Alerts to Episode Sequences
the temporal and probabilistic dependence between alerts As a first step, we arrange intrusion alerts in sequences that
to generate targeted attack graphs without a priori expert characterize an attacker strategy. Raw intrusion alerts are
knowledge. The probabilistic deterministic finite automaton noisy and often multiple alerts are triggered by a single
(S-PDFA) that we use has more expressive power than Mar-
kov chains, while being easier to interpret. 1. https://github.com/tudelft-cda-lab/SAGE
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
734 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
TABLE 1
For Each CPTC-2018 Team, the Number of Raw Alerts and
How They Are Compressed in Each Phase of SAGE
t ¼ 1:0 sec following [5], [42]. (iii) Instead of using the default window w and given oej ¼ ha; v; tServ; ts; ci 2 O, e we define
alert signature attribute, we augment alerts with attack stages o^av;c
j ¼ htServ; ts; ci such that P ð^
o
ts 1
av;c
Þ ¼ i w, Pts ð^v Þ
oav;c
proposed by the Action-Intent Framework (AIF) of Moskal Pts ð^ oav;c
1 Þ w, and P ð^
o
ts j
av;c
Þ P ð^o
ts jþ1
av;c
Þ, for 1 j v.
et al. [49] for categorizing them into their respective attack
Here, PX ð^oav;c ^av;c
j Þ is the projection of the X attribute of o j .
phases. The AIF provides a better representation of the attack 0
Furthermore, we use f ðiÞ to denote the first derivative
stages. Based on the MITRE ATT&CK framework [50], it was
the number of alerts per-window over time, i.e., f 0 ðiÞ ¼
of av;c
proposed specifically to map action-types to dynamic observ- Dj€
oi j
ables, such as intrusion alerts. The AIF provides a mapping Di (will be used to define slope in Algorithm 1). In con-
mcat ¼ MapðsignÞ from alert signatures to attack stages (see trast to other works that use sIP and dIP as explicit features
appendix, which can be found on the Computer Society Digi- [24], [25], [26], we only use them to construct sequences.
tal Library at http://doi.ieeecomputersociety.org/10.1109/ This allows identification of related alerts originating from
TDSC.2021.3117348). (iv) Finally, the filtered set O e of intrusion different sources.
alerts oe is a 5-tuple oe ¼ hsIP; dIP; tServ; ts; mcati for each
o 2 OF . Fig. 2 shows the distribution of the attack stages 4.1.3 Aggregating AS Into Episode Sequences (ES)
across all six teams in the filtered CPTC-2018 dataset.
Intrusion alerts are aggregated into a group, such that they
likely belong to the same attacker action. In the literature,
4.1.2 Gathering Alerts Into Alert Sequences (AS) such an aggregation is called an attack episode [42]. We
There are three main methods for converting discrete observ- assume that these episodes closely characterize attacker
ables into sequences: aggregation based on (i) source IP: actions. Generally, low-severity alerts are so frequent that
showing the attacker’s perspective, (ii) destination IP: show- they subsume high-severity alerts. To overcome this, we
ing the victim’s perspective, and (iii) (source IP, destination treat each attack stage separately. Intuitively, we test the fre-
IP) pair: showing individual interactions between unique quency of all alerts in a windowed sequence: when the fre-
attackers and victims. We select (iii) because the sequences quency starts to increase (an up), we consider it the start of an
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 735
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
736 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
Fig. 5. A suffix tree for three traces. For any vertex, the previous vertex
happens chronologically in the future.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 737
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
738 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
TABLE 3
Experimental Dataset Summary (Before Filtering)
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 739
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
740 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 741
TABLE 4 TABLE 5
Number of Unique Paths Discovered by the CPTC-2018 CPTC-2018 Team Ranking Based on the Fraction of Unique
Teams, per Objective Severe Vertices Discovered.
# Vertices
Teams # Active hosts Weighted average percentage
High-sev Medium-sev
(out of 70) (out of 148)
T5 2/5 28 (40%) 40 (27%) 35.67
T1 5/6 18 (26%) 62 (42%) 31.33
T9 5/5 23 (33%) 36 (24%) 30.0
T7 6/6 22 (31%) 26 (18%) 26.67
T8 6/7 15 (21%) 32 (22%) 21.33
T2 3/6 3 (4%) 8 (5%) 4.33
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
742 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
TABLE 6
Differences in the Objectives Obtained in CPTC-2017 and
CPTC-2018 as modeled by the S-PDFA
Fig. 12. Attack graph of data exfiltration over smtp for CCDC-2018. The
same attacker host makes 13 attempts. Paths starting from severe
attack stages are possible because the attack graphs show part of a full
attack campaign.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 743
Fig. 13. Attack graph of network DoS over ntp for CCDC-2018. There are
six possible starting actions and two possible ways to reach the objective.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
744 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
To build resilience, perturbed traces can be added to the train- [3] R. Sadoddin and A. Ghorbani, “Alert correlation survey: Frame-
work and techniques,” in Proc. Int. Conf. Privacy Secur. Trust:
ing dataset at learning time. Note that oversampling will alter Bridge Gap Between PST Technol. Bus. Services, 2006, pp. 1–10.
the true data distribution, which is why we do not opt for this [4] S. Salah, G. Macia-Fernandez, and J. E. DıAz-Verdejo, “A model-
solution. Lastly, we do not yet have a metric to measure model based survey of alert correlation techniques,” Comput. Netw., vol. 57,
interpretability. Metrics like AIC, BIC, and Perplexity produce pp. 1289–1317, 2013.
[5] F. M. Alserhani, “Alert correlation and aggregation techniques for
arbitrary values for models learned on different parameters, reduction of security alerts and detection of multistage attack,”
making the comparison meaningless. Int. J. Adv. Stud. Comput. Sci. Eng., vol. 5, 2016, Art. no. 1.
Future work will focus on: (a) evaluating the adversarial [6] L. Williams, R. Lippmann, and K. Ingols, “GARNET: A graphical
robustness of SAGE; (b) deploying SAGE during a security attack graph and reachability network evaluation tool,” in Proc.
Int. Workshop Vis. Comput. Secur., 2008, pp. 44–59.
competition to measure its effectiveness; and (c) building [7] M. Chu, K. Ingols, R. Lippmann, S. Webster, and S. Boyer,
alert-driven AGs on the fly to monitor evolving threats. “Visualizing attack graphs, reachability, and trust relationships
with NAVIGATOR,” in Proc. 7th Int. Symp. Vis. Cyber Secur., 2010,
pp. 22–33.
8 CONCLUSION [8] M. Angelini, N. Prigent, and G. Santucci, “PERCIVAL: Proactive
and reactive attack and response assessment for cyber incidents
Intrusion alerts play a critical role in extracting intelligence using visual analytics,” in Proc. IEEE Symp. Vis. Cyber Secur., 2015,
about attacker strategies, which is mostly a labor-intensive pp. 1–8.
and expert knowledge-driven process. To the best of our [9] S. Roschke, F. Cheng, and C. Meinel, “A new alert correlation
algorithm based on attack graph,” in Proc. Comput. Intell. Secur.
knowledge, SAGE is the first tool that generates purely alert- Inf. Syst., 2011, pp. 58–67.
driven attack graphs (AG), without a priori expert knowl- [10] C. Liu, A. Singhal, and D. Wijesekera, “Using attack graphs in
edge. We elaborate upon SAGE’s sequence learning pipeline, forensic examinations,” in Proc. 7th Int. Conf. Availability Rel.
which is fully transparent, interpretable and explainable. As Secur., 2012, pp. 596–603.
[11] S. Noel, M. Elder, S. Jajodia, P. Kalapa, S. O’Hare, and K. Prole,
a core building block, SAGE utilizes a suffix-based probabi- “Advances in topological vulnerability analysis,” in Proc. Cyberse-
listic deterministic finite automaton (S-PDFA) — a model cur. Appl. Technol. Conf. Homeland Secur., 2009, pp. 124–129.
that leverages the temporal and probabilistic dependence [12] X. Ou, S. Govindavajhala, and A. W. Appel, “Mulval: A logic-
between alerts. The S-PDFA brings infrequent severe alerts based network security analyzer,” in Proc. USENIX Secur. Symp.,
2005, pp. 113–128.
into the spotlight without discarding any low-severity alerts. [13] M. L. Artz, “NetSPA: A network security planning architecture,”
Targeted attack graphs are then extracted on a per-victim, PhD dissertation, Dept. Elect. Eng. Comput. Sci., Massachusetts
per-objective basis. Using several use-cases, we demonstrate Inst. Technol., Cambridge, MA, USA, 2002.
the practical utility of SAGE’s AGs. [14] S. Jha, O. Sheyner, and J. Wing, “Two formal analyses of attack
graphs,” in Proc. 15th IEEE Comput. Secur. Found. Workshop, 2002,
Our extensive experiments show that the AGs provide a pp. 49–63.
clear picture of the attack progression, and capture the strate- [15] C. Sillaber, C. Sauerwein, A. Mussmann, and R. Breu, “Data qual-
gies of the participating teams. Specifically for CPTC-2018, ity challenges and future research directions in threat intelligence
sharing practice,” in Proc. ACM Workshop Inf. Sharing Collaborative
SAGE compresses over 330k alerts in 93 AGs in under a min- Secur., 2016, pp. 65–70.
ute. These AGs can be used for both, forensic analysis of the [16] A. Nadeem, S. Verwer, and S. J. Yang, “SAGE: Intrusion alert-
attacks, and intelligence collection: (i) They show exactly driven attack graph extractor,” in Proc. IEEE Symp. Vis. Cyber
how specific attacks transpired and reveal that attackers fol- Secur., 2021.
[17] M. van Bekkum, M. de Boer, F. van Harmelen, A. Meyer-Vitali ,
low shorter paths to re-exploit objectives 84.5% of the time; and A. T. Teije, “Modular design patterns for hybrid learning and
(ii) They discover 29 uniquely identifiable attack paths, com- reasoning systems,” Applied Intelligence, Springer, pp. 1–19, 2021.
posed of 15.8 episodes on average; (iii) They rank attackers [18] F. Valeur, G. Vigna, C. Kruegel, and R. A. Kemmerer,
based on the severity of their actions, showing that Team 5 “Comprehensive approach to intrusion detection alert correlation,”
IEEE Trans. Dependable Secure Comput., vol. 1, no. 3, pp. 146–169,
visits the highest, while Team 2 visits the lowest number of Third Quarter 2004.
severe vertices. SAGE is agnostic to host and network prop- [19] S. Verwer and C. A. Hammerschmidt, “Flexfringe: A passive
erties: SAGE is capable of producing insightful attack graphs automaton learning package,” in Proc. IEEE Int. Conf. Softw. Main-
even when no ground truth about attackers and the target tenance Evol., 2017, pp. 638–642.
[20] RIT, 2021. Accessed: Jul. 08, 2021. [Online]. Available: https://
network is available. SAGE is released in a docker container globalcptc.org/
for cross-platform support. [21] WRCCDC, 2021. Accessed: Jul. 08, 2021. [Online]. Available:
http://www.nationalccdc.org/
[22] D. Shackleford, “Who’s using cyberthreat intelligence and how?,”
ACKNOWLEDGMENTS SANS Institute, 2015.
We thank Profs. Bill Stackpole and Daryl Johnson for their [23] P. Ning, Y. Cui, and D. S. Reeves, “Constructing attack scenarios
through correlation of intrusion alerts,” in Proc. 9th ACM Conf.
guidance, and the reviewers for their constructive feedback Comput. Commun. Secur., 2002, pp. 245–254.
that has tremendously improved this manuscript. [24] X. Qin and W. Lee, “Discovering novel attack strategies from
INFOSEC alerts,” in Proc. Eur. Symp. Res. Comput. Secur., 2004,
pp. 439–456.
REFERENCES [25] B. Zhu and A. A. Ghorbani, “Alert correlation for extracting attack
[1] W. U. Hassan et al., “NODOZE: Combatting threat alert fatigue strategies,” Int. J. Netw. Secur., vol. 3, pp. 244–258, 2006.
with automated provenance triage,” in Proc. Netw. Distrib. Syst. [26] C.-H. Wang and Y.-C. Chiou, “Alert correlation system with auto-
Secur. Symp., 2019. matic extraction of attack strategies by using dynamic feature
[2] T. Casey, “Survey: 27 percent of it professionals receive more than weights,” Int. J. Comput. Commun. Eng., vol. 5, pp. 1–10, 2016.
1 million security alerts daily,” 2018. Accessed: Jul. 08, 2021. [27] S. Haas and M. Fischer, “GAC: Graph-based alert correlation for the
[Online]. Available: https://www.imperva.com/blog/27-percent- detection of distributed multi-step attacks,” in Proc. 33rd Annu.
of-it-professionals-receive-more-than-1-million-security-alerts-daily ACM Symp. Appl. Comput., 2018, pp. 979–988.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
NADEEM ET AL.: ALERT-DRIVEN ATTACK GRAPH GENERATION USING S-PDFA 745
[28] R. Shittu, A. Healing, R. Ghanea-Hercock, R. Bloomfield, and [51] W. Cui, J. Kannan, and H. J. Wang, “Discoverer: Automatic proto-
M. Rajarajan, “Intrusion alert prioritisation and attack detection col reverse engineering from network traces,” in Proc. 16th USE-
using post-correlation analysis,” Comput. Secur., vol. 50, pp. 1–15, NIX Secur. Symp., 2007, Art. no. 14.
2015. [52] J. De Ruiter and E. Poll, “Protocol state fuzzing of TLS
[29] S. McElwee, J. Heaton, J. Fraley, and J. Cannady, “Deep learning implementations,” in Proc. 24th USENIX Conf. Secur. Symp., 2015,
for prioritizing and responding to intrusion detection alerts,” in pp. 193–206.
Proc. IEEE Mil. Commun. Conf., 2017, pp. 1–5. [53] C. Y. Cho, D. Babic, E. C. R. Shin, and D. Song, “Inference and analy-
[30] K. Kaynar, “A taxonomy for attack graph generation and usage sis of formal models of botnet command and control protocols,” in
in network security,” J. Inf. Secur. Appl., vol. 29, pp. 27–56, Proc. 17th ACM Conf. Comput. Commun. Secur., 2010, pp. 426–439.
2016. [54] P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda,
[31] P. Ning, D. Xu, C. G. Healey, and R. S. Amant, “Building attack “Prospex: Protocol specification extraction,” in Proc. 30th IEEE
scenarios through integration of complementary alert correlation Symp. Secur. Privacy, 2009, pp. 110–125.
method,” in Proc. Netw. Distrib. Syst. Secur. Symp., 2004, pp. 97–111. [55] K. J. Lang, B. A. Pearlmutter, and R. A. Price, “Results of the
[32] H. Hu, J. Liu, Y. Zhang, Y. Liu, X. Xu, and J. Huang, “Attack sce- Abbadingo one DFA learning competition and a new evidence-
nario reconstruction approach using attack graph and alert data driven state merging algorithm,” in Proc. Int. Colloq. Grammatical
mining,” J. Inf. Secur. Appl., vol. 54, 2020, Art. no. 102522. Inference, 1998, pp. 1–12.
[33] J. Homer, A. Varikuti, X. Ou, and M. A. McQueen , “Improving [56] M. J. Heule and S. Verwer, “Software model synthesis using satis-
attack graph visualization through data reduction and attack fiability solvers,” Empir. Softw. Eng., vol. 18, pp. 825–856, 2013.
grouping,” in Proc. Int. Workshop Vis. Comput. Secur., 2008, [57] C. De la Higuera, Grammatical Inference: Learning Automata and
pp. 68–79. Grammars. Cambridge, U.K.: Cambridge Univ. Press, 2010.
[34] K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer, [58] R. C. Carrasco and J. Oncina, “Learning stochastic regular gram-
“Modeling modern network attacks and countermeasures using mars by means of a state merging method,” in Proc. Int. Colloq.
attack graphs,” in Proc. Annu. Comput. Secur. Appl. Conf., 2009, Grammatical Inference, 1994, pp. 139–152.
pp. 117–126. [59] R. Parekh and V. Honavar, “Learning DFA from simple exam-
[35] J. Navarro et al., “HuMa: A multi-layer framework for threat anal- ples,” Mach. Lang., vol. 44, pp. 9–35, 2001.
ysis in a heterogeneous log environment,” in Proc. Int. Symp. [60] S. Verwer, R. Eyraud, and C. De La Higuera, “PAUTOMAC: A
Found. Practice Secur., 2017, pp. 144–159. probabilistic automata and hidden Markov models learning com-
[36] J. Navarro, V. Legrand, A. Deruyver, and P. Parrend, “OMMA: petition,” Mach. Learn., vol. 96, pp. 129–154, 2014.
Open architecture for operator-guided monitoring of multi-step [61] B. Balle, R. Eyraud, F. M. Luque, A. Quattoni, and S. Verwer,
attacks,” EURASIP J. Inf. Secur., vol. 2018, 2018, Art. no. 6. “Results of the sequence prediction challenge (SPiCe): A competi-
[37] M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner, and tion on learning the next symbol in a sequence,” in Proc. 13th Int.
A. Rauber, “A framework for cyber threat intelligence extraction Conf. Grammatical Inference, 2017, pp. 132–136.
from raw log data,” in Proc. IEEE Int. Conf. Big Data, 2019, [62] Q. Lin, Y. Zhang, S. Verwer, and J. Wang, “MOHA: A multi-mode
pp. 3200–3209. hybrid automaton model for learning car-following behaviors,”
[38] Q. Lin, S. Adepu, S. Verwer, and A. Mathur, “TABOR: A graphical IEEE Trans. Intell. Transp. Syst., vol. 20, no. 2, pp. 790–796, Feb.
model-based approach for anomaly detection in industrial control 2019.
systems,” in Proc. Asia Conf. Comput. Commun. Secur., 2018, [63] A. Nadeem, S. Verwer, S. Moskal, and S. J. Yang, “Enabling visual
pp. 525–536. analytics via alert-driven attack graphs,” in Proc. ACM Conf. Com-
[39] A. Nadeem, C. Hammerschmidt, C. H. Ga~ nan, and S. Verwer, put. Commun. Secur., 2021.
“Beyond labeling: Using clustering to build network behavioral [64] A. Adadi and M. Berrada, “Peeking inside the black-box: A survey
profiles of malware families,” Malware Analysis Using Artificial on explainable artificial intelligence (XAI),” IEEE Access, vol. 6,
Intelligence and Deep Learning. Berlin, Germany: Springer, 2021. pp. 52138–52160, 2018.
[40] S. C. De Alvarenga , S. Barbon Jr , R. S. Miani, M. Cukier, and [65] RIT, “CPTC dataset,” 2018. Accessed: Jul. 08, 2021. [Online].
B. B. Zarpel~ ao, “Process mining and hierarchical clustering to Available: https://mirror.rit.edu/cptc/
help intrusion alert visualization,” Comput. Secur., vol. 73, [66] F. Hassanabad, “CCDC dataset,” 2019. Accessed: Jul. 08, 2021.
pp. 474–491, 2018. [Online]. Available: https://github.com/FrankHassanabad/
[41] Y. Chen, Z. Liu, Y. Liu, and C. Dong, “Distributed attack modeling suricata-sample-data
approach based on process mining and graph segmentation,” [67] OSIF, 2019. Accessed: Jul. 08, 2021. [Online]. Available: https://
Entropy, vol. 22, 2020, Art. no. 1026. suricata.readthedocs.io/en/suricata-6.0.3/
[42] S. Moskal, S. J. Yang, and M. E. Kuhl, “Extracting and evaluating [68] E. M. Hutchins et al., “Intelligence-driven computer network
similar and unique cyber attack strategies from intrusion alerts,” defense informed by analysis of adversary campaigns and intru-
in Proc. IEEE Int. Conf. Intell. Secur. Inform., 2018, pp. 49–54. sion kill chains,” Leading Issues in Information Warfare & Security
[43] J. Liu, B. Liu, R. Zhang, and C. Wang, “Multi-step attack scenarios Research, vol. 1, p. 80, 2011.
mining based on neural network and Bayesian network attack
graph,” in Proc. Int. Conf. Artif. Intell. Secur., 2019, pp. 62–74.
[44] J. B. Lee, R. A. Rossi, S. Kim, N. K. Ahmed, and E. Koh, “Attention
Azqa Nadeem received the BS degree from the National University of
models in graphs: A survey,” ACM Trans. Knowl. Discov. Data, Science and Technology, Islamabad, Pakistan, in 2015 and the MS
vol. 13, 2019, Art. no. 62. degree (cum laude) in 2018 from the Delft University of Technology, Delft,
[45] M. T. Ribeiro, S. Singh, and C. Guestrin, ““Why should I trust you?” The Netherlands, where she is currently working toward the PhD degree
Explaining the predictions of any classifier,” in Proc. 22nd ACM with the Cyber Analytics Lab. Her research interests include development
SIGKDD Int. Conf. Knowl. Discov. Data Mining, 2016, pp. 1135–1144. of explainable sequential machine learning systems for network security
[46] R. Roscher, B. Bohn, M. F. Duarte, and J. Garcke, “Explainable
applications. She was the recipient of the JvEffen Excellence Scholarship
machine learning for scientific insights and discoveries,” IEEE
in 2016, and the Best Graduate Award in 2019 from the Delft University of
Access, vol. 8, pp. 42200–42216, 2020. Technology.
[47] N. Munaiah, A. Rahman, J. Pelletier, L. Williams, and A. Meneely,
“Characterizing attacker behavior in a cybersecurity penetration
testing competition,” in Proc. ACM/IEEE Int. Symp. Empir. Softw. Sicco Verwer is currently an associate professor with the Delft Uni-
Eng. Meas., 2019, pp. 1–6. versity of Technology in machine learning for cybersecurity. He is the
[48] IANA, 2021. Accessed: Jul. 08, 2021. [Online]. Available: https:// head of TU Delft Cyber Analytics Lab where he works on understand-
www.iana.org/assignments/service-names-port-numbers/ able AI for intrusion detection and software understanding. His team
service-names-port-numbers.xhtml won several AI challenges including ones on learning software mod-
[49] S. Moskal and S. J. Yang, “Cyberattack action-intent-framework els, automated reverse engineering, and adversarial machine learn-
for mapping intrusion observables,” 2020, arXiv:2002.07838. ing. He received many grants and awards for his research including
[50] B. E. Strom, A. Applebaum, D. P. Miller, K. C. Nickels, A. G. Pen- prestigious VENI and VIDI grants from NWO, and a test-of-time award
nington, and C. B. Thomas, “Mitre ATT&CK: Design and phil- from ECMLPKDD for his pioneering work on discrimination-free
osophy,” Tech. Rep., Jul. 2018. classification.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.
746 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
Stephen Moskal received the BS and MS degrees in computer engi- Shanchieh Jay Yang (Senior Member, IEEE) received the MS and PhD
neering from the Rochester Institute of Technology (RIT), Rochester, degrees in electrical and computer engineering from the University of
New York, in 2016. He is currently working toward the PhD degree in Texas at Austin, Austin, Texas, in 1998 and 2001, respectively. He is cur-
engineering at the Rochester Institute of Technology, Rochester, New rently a professor with the Department of Computer Engineering and
York. His current research interests include the simulation and model- director of Global Outreach for Global Cybersecurity Institute, Rochester
ing of cyber-attack scenarios and behaviors along with the application Institute of Technology. His research interests include cyber attack model-
of deep machine learning techniques to cyber security. He has devel- ing, machine learning, and simulation to enhance cyber situational aware-
oped concepts such as the Attacker Behavior Model (ABM) for cyber ness and anticipatory cyber defense. He was a NSF Trusted CI fellow in
threat simulations and the Attack-Action Framework (AIF) to describe 2019 and a NSF Trusted CI TTP fellow in 2020. He was recognized in
the intentions of a cyber-adversary over an attack scenario. Most 2019 with IEEE Region 1 Outstanding Teaching in an IEEE Area of Inter-
recently his effort has been applying transfer learning techniques to est Award for outstanding leadership and contributions to cybersecurity
leverage information cyber security texts to aid in the interpretation and computer engineering education.
and classification of IDS alert descriptions to the AIF. He is expected
to graduate with a doctor of engineering degree in 2021.
" For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/csdl.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on May 09,2022 at 16:25:23 UTC from IEEE Xplore. Restrictions apply.