real time lateral movement detection based on …real time lateral movement detection based on...

9
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tian , Wei Shi , Yuhang Wang , Chunsheng Zhu § , Xiaojiang Du , Shen Su *† , Yanbin Sun , Nadra Guizani k * Corresponding Author [email protected] Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China School of Information Technology Faculty of Engineering and Design, Carleton University, Ottawa, Canada § Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, British Columbia, Canada Department of Computer and Information Sciences, Temple University, Philadelphia, USA k ECE Department, Purdue University, Indiana, USA Abstract—Edge computing is providing higher class intelligent service and computing capabilities at the edge of the network. The aim is to ease the backhaul impacts and offer an improved user experience, however, the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control and service stages. In order to prevent users from using the edge-cloud computing environment to carry out lateral movement attacks, we proposed a method named CloudSEC meaning real time lateral movement detection based on evidence reasoning network for the edge-cloud envi- ronment. The concept of vulnerability correlation is introduced. Based on the vulnerability knowledge and environmental infor- mation of the network system, the evidence reasoning network is constructed, and the lateral movement reasoning ability provided by the evidence reasoning network is used. CloudSEC realizes the reconfiguration of the efficient real-time attack process. The experiment shows that the results are complete and credible. Index Terms—Network security, Edge Artificial Intelligence, Cloud Computing, Correlation, Lateral Movement I. I NTRODUCTION Cloud computing services are critical information platform, application and infrastructures resources that users access via Internet[1-3]. These services, offered by companies such as Google and Amazon, enable customers to leverage powerful computing resources that would otherwise be beyond their means to purchase and maintenance. The success of the cloud computing has already changed the appearance of the world information infrastructure. In order to ease the backhaul impacts and offer an improved user experience, edge computing are designed to share the load of cloud center, provides an IT service environment and computing capabilities at the edge of the network[4,5]. The en- vironment of edge computing is characterized by low latency, proximity, high bandwidth. Combined with the traditional cloud computing environment, the edge computing enables innovative services such as e-Health, augmented reality, smart camera, gaming and industry automation [6]. The ”edge-cloud” model extends the complexity of cloud services [7-11]. More authorities have to be transferred to the edge participants, and more stages and data interactions will be involved during the procedure of services [12-15]. As the result, it turns out to be impractical to prevent all intrusions. Thus, monitoring the operation of a system is essential to its security. To that end, researchers collect monitoring informa- tion to estimate the current state of the system based on the usage patterns, detect whether there exist intrusions, and drive response actions. Lateral movement techniques are frequently used to launch cyber-attack, especially in the hierarchical architecture system. In the edge-cloud environment, two main challenges are in- volved in the lateral movement detection. 1. The data persistence in edge computing may be different with the traditional scenario, there is less certainty in where data originated from, whether the data would be persistence, and where it will be stored. Since the edge nodes are often the limited memory and computationally constrained devices. The traditional lateral movement detection methods which need significant manual effort and business correlated knowledges lacks the opportunity to flourish in such scenario. 2. The underlying architecture of the edge computing en- vironment is often dynamic, for example, the vehicular frog computing system based on the vehicle ad hoc networks. As the result, the lateral movement detection methods that rely on detecting changes in nodes behaviors may not be applied successfully on the edge environment. Existing solutions are with few considerations for such scenario. When a host is discovered to be compromised, there are a couple of fundamental questions that should always be asked: What was the route this attack traverse? How was the movement possible? What was the end target? What controls were executed to make the threat persistent? In order to meet these forensic requirement, the lateral movement detection method should be applied to the edge-cloud computing en- arXiv:1902.04387v1 [cs.CR] 12 Feb 2019

Upload: others

Post on 26-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

Real Time Lateral Movement Detection based onEvidence Reasoning Network for Edge Computing

Environment

Zhihong Tian†, Wei Shi‡, Yuhang Wang†, Chunsheng Zhu§, Xiaojiang Du¶, Shen Su∗†, Yanbin Sun†, Nadra Guizani‖∗Corresponding Author [email protected]

†Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China‡School of Information Technology Faculty of Engineering and Design, Carleton University, Ottawa, Canada

§Department of Electrical and Computer Engineering,The University of British Columbia, Vancouver, British Columbia, Canada

¶Department of Computer and Information Sciences, Temple University, Philadelphia, USA‖ECE Department, Purdue University, Indiana, USA

Abstract—Edge computing is providing higher class intelligentservice and computing capabilities at the edge of the network. Theaim is to ease the backhaul impacts and offer an improved userexperience, however, the edge artificial intelligence exacerbatesthe security of the cloud computing environment due to thedissociation of data, access control and service stages. In order toprevent users from using the edge-cloud computing environmentto carry out lateral movement attacks, we proposed a methodnamed CloudSEC meaning real time lateral movement detectionbased on evidence reasoning network for the edge-cloud envi-ronment. The concept of vulnerability correlation is introduced.Based on the vulnerability knowledge and environmental infor-mation of the network system, the evidence reasoning network isconstructed, and the lateral movement reasoning ability providedby the evidence reasoning network is used. CloudSEC realizesthe reconfiguration of the efficient real-time attack process. Theexperiment shows that the results are complete and credible.

Index Terms—Network security, Edge Artificial Intelligence,Cloud Computing, Correlation, Lateral Movement

I. INTRODUCTION

Cloud computing services are critical information platform,application and infrastructures resources that users access viaInternet[1-3]. These services, offered by companies such asGoogle and Amazon, enable customers to leverage powerfulcomputing resources that would otherwise be beyond theirmeans to purchase and maintenance. The success of the cloudcomputing has already changed the appearance of the worldinformation infrastructure.

In order to ease the backhaul impacts and offer an improveduser experience, edge computing are designed to share theload of cloud center, provides an IT service environment andcomputing capabilities at the edge of the network[4,5]. The en-vironment of edge computing is characterized by low latency,proximity, high bandwidth. Combined with the traditionalcloud computing environment, the edge computing enablesinnovative services such as e-Health, augmented reality, smartcamera, gaming and industry automation [6].

The ”edge-cloud” model extends the complexity of cloudservices [7-11]. More authorities have to be transferred to theedge participants, and more stages and data interactions willbe involved during the procedure of services [12-15]. As theresult, it turns out to be impractical to prevent all intrusions.Thus, monitoring the operation of a system is essential to itssecurity. To that end, researchers collect monitoring informa-tion to estimate the current state of the system based on theusage patterns, detect whether there exist intrusions, and driveresponse actions.

Lateral movement techniques are frequently used to launchcyber-attack, especially in the hierarchical architecture system.In the edge-cloud environment, two main challenges are in-volved in the lateral movement detection.

1. The data persistence in edge computing may be differentwith the traditional scenario, there is less certainty in wheredata originated from, whether the data would be persistence,and where it will be stored. Since the edge nodes are often thelimited memory and computationally constrained devices. Thetraditional lateral movement detection methods which needsignificant manual effort and business correlated knowledgeslacks the opportunity to flourish in such scenario.

2. The underlying architecture of the edge computing en-vironment is often dynamic, for example, the vehicular frogcomputing system based on the vehicle ad hoc networks. Asthe result, the lateral movement detection methods that relyon detecting changes in nodes behaviors may not be appliedsuccessfully on the edge environment.

Existing solutions are with few considerations for suchscenario. When a host is discovered to be compromised, thereare a couple of fundamental questions that should always beasked: What was the route this attack traverse? How was themovement possible? What was the end target? What controlswere executed to make the threat persistent? In order to meetthese forensic requirement, the lateral movement detectionmethod should be applied to the edge-cloud computing en-

arX

iv:1

902.

0438

7v1

[cs

.CR

] 1

2 Fe

b 20

19

Page 2: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

vironments.In this paper, we present a lateral movement detection

method based on Evidence Reasoning Network (ERN) foredge-cloud computing environment referred to as CloudSEC.CloudSEC introduces the concept of vulnerability correlationand built an ERN based on the network system vulnerabilitiesand environmental information. Experimental results show thatCloudSEC supplies a complete and credible evidence chainand it also has the capacity of real-time lateral movementreasoning. These provide a strong guarantee for the rapidand effective evidence investigation. The contributions ofCloudSEC are threefold: First, it offers a list of concreteevidence on the detected attack which gives more confidenceto the cloud service provider. Second, it enables the cloudservice provider to be fully aware the consequences of anattack. Finally, it enables the cloud service provider to betterdetermine an appropriate course of actions that needs to betaken.

The remainder of this paper is organized as follows: Insection 2, we present related previous works, such as eventcorrelation in virtual machine. In Section 3, we depict theoverall structure of our method. In Section 4, we present thedetails of our proposed lateral movement detection methodand its correlation algorithms. The experiments conducted toevaluate our method are discussed in Section 5. Section 6concludes the paper with a summary and discussion of futureresearch directions.

II. RELATED WORKS

Up to today, there have been several proposed techniques ofanalyzing android malware cloud data [16-20]. In this paper,we focus exclusively on the related works using forensicstechniques on monitoring virtual machines in cloud computingenvironment.

Most mature forensic investigation tools such as EnCase[21] and Safeback [22] focus on capturing and analyzingevidence from media stores on a single host. Mnemosyne isa dynamically configurable advanced packet capturing appli-cation that supports multi-stream capturing, sliding-windowbased logging to conserve space, and query support on col-lected packets [23]. Evidence graph network forensic analysismechanism [24][25] includes effective evidence presentation,manipulation and automated reasoning. Although it is nice topresent evidence correlation in graphic mode, this system isstill a prototype and lacks the effective capability of inference.Tian et al. [26][27] developed a network intrusion forensicssystem based on transductive scheme and Dempster-ShaferTheory (DST) that can detect and analyze efficiently com-puter crimes in networked environments, and extract digitalevidence automatically. ForNet [28] is a novel distributedlogging mechanism that focuses on network forensic evidencecollection rather than evidence analysis. These approaches relyon the long term log data collection or on the statistical-based methods are not suitable for the poor data persistenceenvironment.

Different from the above-mentioned research, Walls et al.[29] developed DEC0DE, a system for recovering informationfrom phones with unknown storage formats, which was acritical hurdle in forensic triage. Because phones have myriadof custom hardware and software, and all stored data must beexamined. Via flexible descriptions of typical data structures,and using a classic dynamic programming algorithm, DEC0DEsystem is able to identify call logs and address book entriesin phones across a wide range of models and manufacturers.In [30], authors perform extensive study on existing fuzzyhashing algorithms with the goal of understanding their ap-plicability in clustering similar malware. They developed amemory triage tool that uses fuzzy hashing to intuitivelyidentify malware by detecting common pieces of maliciouscode found within a process. In [31], a host-based intrusiondetection system gained a high degree of visibility as it isintegrated into the host’s monitoring process. A new approach,based on the k-Nearest Neighbor (kNN) classifier, is used toclassify program behavior as normal or intrusive. Ko et al.[32] introduced an approach that integrates intrusion detectiontechniques with software wrapping technology to enhance asystem’s ability to defend against intrusions. In particular, theyemploy the NAI Labs Generic Software Wrapper Toolkit toimplement all or part of an intrusion detection system as IDwrappers.

Because the above host-based methods operate at a userlevel, unfortunately, these systems are quite susceptible toattacks once an attacker has gained access privilege to a host.Besides, an operating system crash will generally cause thesystem to fail to open. Since the host-based method runs inthe same fault domain as the rest of the kernel, this willoften cause the entire system to crash or allow the attackerto compromise the kernel [33-35].

III. THE PROPOSED CLOUDSEC FRAMEWORK

The overview of the proposed CloudSEC architecture isshown in Figure 1. CloudSEC consists of two components:EventTracker and AlertCorrelator respectively. Each VirtualMachine (VM) or the Container has a built-in EventTrackerthat used to monitor user activities and detect intrusions byauditing the event log on this system and analyzing commandsand tracing system calls made by the users. AlertCorrelatoris located at the edge of the cloud computing environment. Itcorrelates and analyzes alerts generated by multiple distributednetwork Intrusion Detection Sensors (NIDS) deployed in aspecific cloud computing environment. A central managementunit is responsible for exchanging information, and put in placea set of evaluation criteria used to evaluate the trustworthinessof the results. In the following sections, we describe these twoabove-mentioned components in detail.

The main idea behind CloudSEC is the modeling of ERN.It is known that lateral movement is a sequence of smallattack units/steps happened in different times and networklocations following a certain logic. Each step of an attackcan be considered as a preparation step for the next one.In ERN model, a detected attack step is referred to as an

Page 3: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

Cloud computing environment

Hypervisor

Centralcontroller

VM 1 EventTracker

VM n EventTracker

……

AlertCorrelator

Central management unit

A

2

3 6

109

17

8

3

4

6

52 4 5

Evidence Reasoning Network

Control Flow

Data Flow

EEvvideEEvvide Edge computing environment

Hypervisor

Centralcontroller

Container1 EventTracker

Container nn EventTracker

……

AlertCorrelator

ventTracker

Ale

2

3 6

109

17

8

333

4

666

52 4 5

Evidence Reasoning Network

17

Evid

77

Fig. 1. The Architecture of CloudSEC

……. …….

AND structure OR structure

Fig. 2. Two basic structures of vulnerability correlation

evidence. If we can discover all hidden correlation in anevidence chain, then a lateral movement is detected. Based onthe concept of vulnerability and vulnerability correlation, anERN is constructed to correlate and reasoning out evidencechains and eventually achieve the goal of lateral movementdetection. To ease the understanding of ERN, we first describethe concept of vulnerability and vulnerability correlation.

A. Vulnerability and Vulnerability Correlation

The concept of vulnerability refers to the defects of thecomputer system following certain security strategy. Sincethe vulnerability is an intrinsic factor of security incidents,we define vulnerability and vulnerability correlation as thefollowing:

Definition 1. (Vulnerability). A vulnerability is a defectexists in a software system or software component. The ex-ploitation and utilization of such a defect would violate one ormore security policies and adversely affect the confidentiality,identifiability, and usability of the software system. We notea vulnerability as v in the rest of this paper.

Definition 2. (Vulnerability Correlation). Supposing thata software system S has n vulnerabilities V [S] ={v1, v2, · · · , vn}, if ∃Vli(i = 1 ∼ k ∧ k ≤ n) ∈ V [S] , sothat the attacker could launch a multiple stages attack withvl1, · · · , vlk , then we say vl1, · · · , vlk are correlated, or wesay there exists a correlation among vl1, · · · , vlk.

Vulnerability correlation can be represented either as anAND or an OR structure (as shown in Figure 2).

In an AND structure, the premise of utilizing vulnerabilityv to attack the target system is to utilize all the vulnerabilitiesof vli(1 ≤ i ≤ n, n ≥ 2). In an OR structure, the premise ofutilizing vulnerability v to attack the target system is to utilizeany one of the vulnerabilities in vli(1 ≤ i ≤ n, n ≥ 1).

Given the nature of an attack is to exploit one or moreexisting vulnerabilities on a computer system, we need to

associate the attacks to the vulnerabilities. To do so, we mapthe attack feature space into the vulnerability space, so thatwe could describe the attack correlations in the perspectiveof vulnerability correlations. Therefore, in order to form acredible evidence chain, we construct an ERN to correlatediscrete attack evidences based on vulnerability correlation.

B. Evidence Reasoning Network Model

We use a directed graph to describe the connectivity andvulnerability correlations of an information system network,and denote it as an evidence reasoning network.

Definition 3. (Evidence Reasoning Network). Evidence rea-soning network (ERN) is a directed graph G that is describedusing a set of 5-tuples{N,E,L,W,D}:• N is a set of n vertex, each of which carries some vulnera-

bilities information. A tuple (ni, vi) together represents anetwork node, where ni is the ID of the network node andvi is a set of vulnerabilities on ni and 0 ≤ i ≤ n, n ≥ 0.

• E is a set of e directed links, each of which is an orderedpair: ej(ej ∈ E) = ((nx, vx), (ny, vy)), where nx

contains vx and ny contains vy , 0 ≤ j ≤ e, 0 ≤ x ≤ n,0 ≤ y ≤ n. Such a link ej indicating that (nx, vx)interconnects with (ny, vy), and vx and vy have vulnera-bility correlation. We say (nx, vx) is a parent node, and(ny, vy) is a child node. For simplicity, we denote eachsuch directed link ej as nx → ny . For ∀(ni, vi) ∈ N , wedefine IN(ni, vi) = {EI |EI = ((nl, vl), (ni, vi)), EI ⊆E, (nl, vl) ∈ N, 0 ≤ l ≤ n} as a set of incoming linkwith node (ni, vi) as a child node. Similarly, we defineOUT (ni, vi) = {EJ |EJ = ((ni, vi), (nm, vm)), EJ ⊆E, (nm, vm) ∈ N, 0 ≤ m ≤ n} as a set of directed linksthat have node ni as a parent node.

• L is a set of logical expressions representing the relation-ships among the directed links using AND and OR logicalexpression operators along with brackets. L is one-to-onemapped to N , expressing the relationships among the di-rected links going in or out each specific node. ∀(ni, vi),if IN(ni, vi) = {e1, e2, e3|e1 = ((n1, v1), (ni, vi)), e2 =((n2, v2), (ni, vi)), e3 = ((n3, v3), (ni, vi))} and li =(e1 ∧ e2) ∨ e3, where li ⊆ L, nl ∈ N, 0 ≤ l ≤ n}, Thenparent nodes (n1, v1) and (n2, v2) both fall into an ANDrelationship with (ni, vi). On the other hand, (n3, v3) and(ni, vi) fall into an OR relationship.

• W is defined as a set of risk weights for each vertex inN . W has an one-to-one mapping to N . ∀ni ∈ N , wedefine wi = (fi+pi+ri)/3, where fi ∈ [0, 1] denotes thefunctional value of vertex (ni, vi), including informationservers, database servers, work stations, etc; pi ∈ [0, 1]denotes the probability of successful exploitation of thevulnerability vi on vertex (ni, vi); and ri ∈ [0, 1] denotesthe security impact of vulnerability vi. W is definedto setup standard for evaluating the generated evidencechain.

• D ∈ {qn, pptr} contains a set of data structures foreach vertex in N . It has an one-to-one mapping to N .

Page 4: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

Here qn is a circular queue of length k for evidencestorage. Each element of the queue may be representedas qn = {ts, cptr, wt}, here ts is the timestamp; cptr isthe pointer pointing to the child node used to reconstructan attacking process flow; s is used to show the stateof this node. Its value ranges from 0 to 3, representingrespectively: a start node, both a start node and a virtualnode, an intermediate node, or a virtual node; wt is therisk weight. pptr stores a set of pointers pointing to theparent nodes of this vertex. Such reversed pointers (i.e.pointers pointing to the parent nodes) are used to speedup the evidence reasoning process. For simplicity, we use‘.’ to index each specific element. For example, di.pptror di.qni.ts.

The following set of steps describe briefly the proceduresto generate an ERN:

1) Report the topology of the target network by deviceusers such as the administrators or the node hosts ofthe target network to be protect;

2) Use existing vulnerability scanning tools such as Nmapand Nessus to probe the target network from differentlocations within and outside the managed network do-main;

3) Construct the vertex set;4) Traverse all vertex in the target network and construct

recursively a set of directed links E and the logicalexpression set L based on node connectivity and vul-nerability correlations;

5) Compute W using the predetermined risk weights andinitialize data structure set D.

Obviously, the execution of step 1 and 2 depend on the char-acteristics and scale of the target network topology. Howeverthe efficiency and executability of the forensics can be solvedby pre-computing the ERN a priori.

Figure 3 illustrates an example of a network informationsystem including 5 linux systems (A, B, C, D, and E).Server A has vulnerability v1 that threatens the root users,and vulnerability v2 that threatens regular users. Service rshdis running on B, which permits root users of A and D to gainremote access on B executing shell command. The VM Cruns telnetd and rshd services. rshd allows only root user ofVM D to execute shell command remotely on C. C also hasvulnerability v4 that threatens all root users and vulnerabilityv5 that threatens regular users. D runs sshd service. It hasvulnerability v3 that threatens root users. The edge containerE has vulnerability v6 that threatens all root users. All regularusers of A and the root user of C could gain remote accessto D as root users via ssh. The root users of B and E couldgain remote access to C as a root user through telnet.

The constructed ERN of the above information systemnetwork is shown in Figure 4, including 10 network nodes,and 11 directed links.

C. Evidence Chain Reasoning

ERN provides a framework for the reconstruction of at-tacking flow and evidence chain reasoning. Each evidence

telnetd

VM C

root: v4

use: v5

root: v1

use: v2

Server A

Server BVM D

Container E

rshd

rshd

sshd

root: v3

root: v6

Container E

Fig. 3. Example of information system network

A, v1

B, rshd D, v3

C, rshdD, sshd

A, v2C, v5

C, v4

C, telnetd

12

34

5 6

7

8

9

10

E, v611

A

C D

sshdB rshd

v3

rshd

telnetd

E v6v6

hd

D

ssh

v3

rshd

telnetd

v

hd

v4

v5

v1

v2

rshd

hB

hd

Fig. 4. Example of evidence reasoning network

chain can be represented using a subgraph of ERN. The mainpurpose of evidence preprocessing is to map the extractedevidence out of the attack flows to the vertex of ERN, notedas function map().

Evidence chain reasoning could be abstracted as the fol-lowing: assume there is a time sequenced evidence list:ε1, ε2, · · · , εn, for ∀εi = 1, 2, · · · , n, searching for the evi-dence set within the range of ε1, ε2, · · · , εi−1, such that thereexists a directed link from map(εh) to map(εi) in the ERN,noted as map(εh)→ map(εi), 0 ≤ h ≤ n.

The procedure of evidence chain reasoning includes thefollowing 3 steps:

Step 1. Initialization: fetch an evidence εi, and map it toa vertex in the ERN of a given system, e.g., map(εi) = ni.Then set di.qni.ts as the timestamp ti;

Step 2. Association analysis: the analysis methods dependon the number of links pointing to a vertex ni in ERN:

1) When IN(ni) = 0, εi is the start point of this ERN.Then set di.qni.s = 0, and di.qni.wt = wi;

2) When IN(ni) > 0, use reverse index data structuredi.pptr to find all the parent nodes of ni. If a parentnode nj’s dj .qn is non-empty, we say (nj , ni) is a truth-value link.• If the logical expression li returns a true value with

all the above-mentioned truth-value links, then wesay εi is an intermedia node. Thus we set cptr =di.qni for all parent nodes that make li true, and setdi, qni.s = 2, di.qni.wt = wi;

• If the logical expression li returns a false valuewith all the above-mentioned truth-value links, then

Page 5: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

2

3 6

109

17

8

4 5 2

3 6

109

17

8

4 5

2

3 6

109

17

8

4 5 2

3 6

109

17

8

4 5

0cptr s

d1.qn1 t1ts

wt1wt

d2.qn2 0cptr s

d1.qn1 t1ts

wt1wt

d3.qn3 2d2.qn2 t2 wt22d3.qn3 t3 wt3

d2.qn2 0cptr s

d1.qn1 t1ts

wt1wt

2d2.qn2 t2 wt2

d2.qn2 0cptr s

d1.qn1 t1ts

wt1wt

d3.qn3 2d2.qn2 t2 wt2d4.qn4 2d3.qn3 t3 wt3

2d4.qn4 t4 wt4

(a) Evidence chain reasoning pro-cess

2

3 6

109

17

8

4 5 2

3 6

109

17

8

4 5

2

3 6

109

17

8

4 5

0cptr s

d1.qn1 t1ts

wt1wt

d2.qn2 0cptr s

d1.qn1 t1ts

wt1wt

d3.qn3 2d2.qn2 t2 wt2d4.qn4 3d3.qn3 t3

d2.qn2 0cptr s

d1.qn1 t1ts

wt1wt

2d2.qn2 t2 wt2

d2.qn2 0cptr s

d1.qn1 t1ts

wt1wt

d3.qn3 2d2.qn2 t2 wt2d4.qn4 3d3.qn3 t3

2d4.qn4 t4 wt4

2

3 6

109

17

8

4 5

(b) Timing independent evidencechain reasoning process

Fig. 5. Evidence chain reasoning process examples

we know that εi has no correlation with the otherevidences. Thus we consider εi as a start node, andset di.qni.s = 0, di.qni.wt = wi accordingly.

Step 3. Evidence chain generation: conduct breadth-firstsearch from a vertex ni in the ERN, of which the in-degreeis 0 (i.e. IN(ni) = 0), and generate evidence chain base onthe cptr of the traversed vertices.

Figure 5(a) illustrated the above-mentioned procedure. Theelements in the data structure D changes together with theevidences as shown in Figure 4.

D. Timing Independent Evidence Chain Reasoning

Whether the evidence chain reasoning algorithm can drawa correct conclusion depends on the correct time stamping ofthe evidences. In order to solve the inconsistent time-stampingproblem, which is often a challenge, we propose a timing-independent evidence chain reasoning algorithm. The processis as follows:

Step 1. Initialization: fetch the next evidence εi and map itto a vertex of the ERN of the given system, i.e. map(εi) = ni.Then set di.qni.ts as the timestamp ti;

Step 2. Vertex checking: if di.qni.s = 1 or di.qni.s = 3,then (di.qni.s)−−, di.qni, wt = wi, di.qni.ts = ti, then goback to step 1, otherwise go to step 3;

Step 3. Association analysis: the analysis methods varybased on different types of vertices of the ERN;

1) Case A: When IN(ni) = 0, εi is the start point, setdi.qni.s = 0, and di.qni.wt = wi;

2) Case B: When IN(ni) > 0, if we substitute all truth-value links into li and li is true, then εi is an intermedianode. Thus we set cptr = di.qni for all parent nodesthat make li true, and set di.qni.s = 2, di.qni.wt = wi;

3) Case C: IN(ni) > 0, if we substitute all truth-value linkinto li and li is false, then traverse all parent nodes of ni

to search for one of the parent nodes nj which makes litrue when we increase a virtual record to nj . The virtualrecord generated in the reasoning process indicates thatthe evidence is not acquired by EventTracker, so therisk weights are not taken into account (see furtherexplanation later in subsection III-F). We further conductassociation analysis on nj , if case A is met, then setdj .qnj .s = 1, dj .qnj .cptr = di.qni, di.qni.s = 2,di.qni.wt = wi; if case B is met, then set dj .qnj .s = 3,

dj .qnj .cptr = di.qni, di.qni.s = 2, di.qni.wt = wi;if case C is met, then εi has no correlation with theother evidences. Thus we take εi as a start node, andset di.qni.s = 0, di.qni.wt = wi.

Step 4. Evidence chain generation: conduct breadth-firstsearch from a ERN vertex, of which the in-degree is 0, andgenerate evidence chain based on the cptr of the traversedvertices.

Figure 5(b) shows the approximate reasoning process, wherevertex 3 is a virtual record.

E. Time Complexity Analysis

Let N and E be the number of vertices and edges/links ina given ERN. The first step of our evidence chain reasoningalgorithm finishes in constant time. The time complexity ofthe second step is O(E/N). And the time complexity of thethird step is O(N+E). Therefore, the overall time complexityof the evidence chain reasoning algorithm is O(N + E).

For the time complexity of the ‘Timing Independent Evi-dence Chain Reasoning’ algorithm, the first and the secondstep finish in constant time. Since the algorithm needs todetermine the status of one of the parents node of a virtualnode, the average time complexity of step 3 is O((E/N)2),and BFS time complexity is O(N + E). For a directedcomplete graph, E = N2−N , thus N+E ≥ (E/N)2. Hence,the time complexity of the ‘Timing Independent EvidenceChain Reasoning’ algorithm is O(N + E).

F. Power of the evidence chain

The power of electronic evidence refers to the persuasivepower of an evidence in proving the case. Given W of anERN defines the risk weight of every vertex, EventTrackeradds up the risk weight of all evidences on an evidence chainand it will be used to evaluation the power of an evidencechain.

As mentioned earlier, the virtual record generated in thereasoning process indicates that the evidence is not acquiredby the EventTracker. Therefore, its risk weight is not addedinto the overall weights W . Assume the sum of risk weightsof all evidences in an evidence chain is w, and the sum ofrisk weights of all the virtual records on this evidence chainis w′, the weight of the evidence chain should be calculatedas shown in formula 1. The bigger the value of confidence,the bigger the evidence chain power.

confidence =w

w + w′(1)

G. The application of an ERN in EventTracker

System calls are generally used to change the states of anoperation system, such as creating files, forking processes,changing registries, etc. Monitoring the changes of systemcalls can get many essential characteristics of program oper-ations, and thus form the basis of dynamic security analysis.In an EventTracker, Virtual Machine Introspection technology(VMI) is used to monitor system calls in cloud computinghosts.

Page 6: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

useradd

groupadd

passwd

uname

wget

admin.vbs /etc/passwd

172.16.*.*

bash

Fig. 6. Example of evidence reasoning network for system calls

There are parameter dependencies among sequences ofsystem calls generated by program operation. EventTrackermaps system calls and their dependencies into an ERN modelas the nodes and the links respectively. For example, Figure 6illustrates an example of an Evidence Reasoning Network forsystem calls. First, an attacker uses useradd and groupaddcommands to add system users and set permissions. Thisattacker then sets up passwords through passwd commands.After checking the kernel version information with commanduname, ”admin.vbs” script is downloaded from the remote host172.16.*.* through FTP.

The goal of an EventTracker is to identify complex lateralmovement attacks inside the cloud hosts. In the intrusiondetection literature, an attack scenario (or attack pattern) isa sequence of explicit attack steps, which are logically linkedand lead to an objective. When a set of correlation is received,if an attack scenario is detected, it will raise an intermediateattack alarm, which will prompt the system to capture thecausal relationships among the evidences.

H. Design and implementation of AlertCorrelator

AlertCorrelator is located at the edge of a cloud computingenvironment. It correlates and analyzes alerts generated bymultiple NIDS deployed in the cloud computing environment.NIDS is responsible for monitoring network traffic in real time,finding intrusion events and storing corresponding IP packetsin a database. According to the design of ERN, we can seethat AlertCorrelator does not tolerate false positives in alerts,but it can accept a certain degree of false negatives.

AlertCorrelator collects and preprocesses the alerts first.Every collected alert is coded and normalized into a stan-dardized format. Additional information, such as timestampsand source address of the attacker are also added into thedatabase. Events generated by different NIDS and related withthe same attack are merged into a single alarm. Then thesepreprocessed alarms are added into the ERN as evidences ina chronological order. At last, timing independent evidencechain reasoning algorithm is called. In this phase, the ERNmodel determines whether the attack is either a successfulattack or a non-relevant attack, i.e., an attack that does notlead to lateral movement attack.

For large scale networks, when new NIDS are added tothe cloud boundary, augmenting an existing ERN can bedone easily in an iterative fashion. This demonstrates the highscalability and flexibility of AlertCorrelator.

TABLE IWEIGHT OF VULNERABILITY IMPACT

Vulnerability impact scope Weight

category

1System administrators, managing system resources,system files, system processes, and other resources 1.0

2 System administrator with partial permissions 0.8

3Permissions of any number of system ordinary userswith more independent and private resources 0.6

4Permissions of a system ordinary user and partialpermissions of other ordinary users 0.5

5Permissions of a system ordinary user created bythe system initialization or created by the systemadministrator with its own private resources

0.4

6 Partial permission of a ordinary user 0.2

7Remote visitors who can access network services,usually trusted visitors, who can interact with networkservice processes, scan system information, and so on

0.1

8Remote visitors who are connected to the targetsystem at the physical layer, usually untrusted orfirewalled visitors.

0.0

IV. EXPERIMENT EVALUATION

To further verify the effectiveness of our proposed method,we developed our EventTracker prototype system using Clanguage on Linux RedHat 7.3. We use the intrusion detectionsystem Snort 2.4.3 as the attack detection component, anduse Graphviz to visualize the evidence chain. We conduct ourexperiments on Shuguang servers (CPU 2.4G, MEM 8G). Wereport in this section two sets of experiments.

A. Parameter Setup

In order to evaluate the power of the evidence chain, weneed to set an appropriate risk weights of ERN. Since thedifficulty of utilizing each vulnerability in different situationis different, the probability of successful exploitation of eachvulnerability is different. In our experiments, we assume thatall the probability of successful exploitation of each vulnera-bility are equal, and the functional attributes of network nodesare also equal. As for the security impact of vulnerabilities,we classify the vulnerabilities with the impact scope into 9categories and set each category with a certain weight, asshown in Table II.

B. Reasoning Result of the Lincoln Dataset

Experiment 1 uses the LLDOS1.0 and LLDOS2.0.2 datasets from MIT Lincoln Laboratories. The test bed producingthis data set includes an external Internet environment sim-ulated by 14 hosts, an internal network of 39 hosts, and aDMZ area consisting of 6 hosts, covering operating systemsincluding Windows, Linux RedHat 5.0, SunOS 4.1.4, andSolaris 2.7. Attack detection component is used to producean intranet data set of size 179 MB from each of the twoLLDOS datasets. The type and amount of evidences generatedare shown in Fig 7. Figure 8 shows the evidence chain deducedby EventTracker on LLDOS1.0.

This evidence chain indicates the attacker’s five attackphases: the attacker first scans the entire network from host202.77.162.213 to learn the target host’s IP address range;

Page 7: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

(a) Types and quantity of evi-dences detected from LLDOS1.0intranet dataset

(b) Types and quantity ofevidences detected fromLLDOS2.0.2 intranet dataset

Fig. 7. Categories and quantity of LLDOS dataset

then it executes Sadmind Overflow program with the pingoption checked in order to verify on each host whetherthe Sadmind service is running. It then determines the finaldestination host (e.g. 172.16.115.20 in Figure 5(b)); next,the attacker uses the Solaris operating system’s Sadmindvulnerability to implement a buffer overflow attack; aftergaining the root privileges, the attacker installs the Mstreambackdoor program through telnet and rpc; finally, the attackeruses this compromised slave to launch a DDoS attack tohost 172.16.115.20/172.16.112.10/131.84.1.131. The evidencechain of the above-mentioned attacking process is shown inFigure 5(b). This result matches the documen provided by MITLincoln, which proves the effectiveness of the proposed Event-Tracker. Since there is no virtual records, the confidence is100% in this case.

The deducted evidence chain of LLDOS2.0.2 is shownin Figure 9. This evidence chain also contains a completeattack sequence, and uses a springboard attack. Similar toLLDOS 1.0, the attacker also implemented an attack on host202.77.162.213, and succeeded in obtaining the root privilegesof hosts 172.16.115.20 and 172.16.112.50 that are using theSolaris operating system with Sadmind vulnerability. However,comparing to the former one, the LLDOS2.0.2 attack processis more complex and with latency. For example, the attackerdid not use the ”ICMP echo reply” which could be easilyshielded. Instead, it uses the legitimate ”DNS HINFO” queryto obtain the target host (a DNS server). It is noted that theshadow node ”FTP upload” in the evidence chain indicates thatthe attacker used ftp to upload the evidence of the Mstreambackdoor program and attacking script. However, the attackdetection component missed this event. To ensure the integrityof the evidence, EventTracker generated a virtual record.According to the weights set in Table I, the confidence isreduced to 86% accordingly. Then we use the timestamp ofthe alert of “INFO TELNET access 119” to find the PCL. Tworelations were found which is shown in Figure 9. This furtherproves the correctness of our reasoning algorithm.

C. Detection Result of Treasure Hunt Dataset

The second experiment uses the Treasure Hunt dataset col-lected by the University of California Santa Barbara to guidestudents in the design of network offense and defense course.Its network topology is divided into three sub-networks:Alpha, Omega, and DMZ, which includs MySQL servers,

202.77.162.213

172.16.112.50

172.16.115.20 131.84.

1.31

172.16.112.10

Terminal

ICMP PING

RPC Portmap sadmind request UDP

RPC sadmind query with root credentials attempt UDP

RSERVICES rsh root

DDOS mstream handler to agent

BAD-TRAFFIC lookback traffic

INFO TELNET access

Fig. 8. Evidence Chain of LLDOS1.0 Intranet Dataset

202.77.162.213

172.16.112.50

172.16.115.20 131.84.1.31

Terminal

FTP upload

RPC Portmap sadmind request UDP

RPC sadmind query with root credentials attempt UDP

RSERVICES rsh root DDOS mstream handler to agent

BAD-TRAFFIC lookback trafficINFO TELNET access

58

56

59

57

152

99

105

103

106

104

153

119

158

F

Fig. 9. Evidence chain of LLDOS2.0 data set.

event processing servers, file servers and WEB servers. Al-though the network topology is not complex, a wide rangeof attack methods are adopted in this network. Therefore,we believe that this dataset is suitable for the edge-cloudscenario functional testing of the proposed EventTracker. Thecorresponding evidence chains are shown in Figure 10 andFigure 11, respectively, with confidence interval of 91.7%and 33.3%.

D. Performance Analysis

Table II gives the time overhead of CloudSEC in handlingthe above sets of data. It is shown that the number of evidencechains CloudSEC could handle per second is around 100.According to [29], about 10-20000 security events per dayon average are detected by each detection point. CloudSECgreatly exceeds the current actual processing requirements

192.168.10.80

Terminal

ICMP PING

RPC request UDP

SCAN

SNMP request

RESERVICE reexc username overflow

DOS

SNMP trap tcp

192.168.20.6

192.168.20.49

192.168.20.157

D

Fig. 10. Evidence Chain of the alpha sub-network.

Page 8: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

192.168.10.90

Terminal

ICMP PING

SCAN

SNMP request

DOS

SNMP trap tcp

D

192.168.70.6

192.168.70.157

192.168.770.49

Fig. 11. Evidence Chain of the Omega sub-network

TABLE IITHE TIME OVERHEAD OF CLOUDSEC

Data SetsIntrusionEvents

Process Time(sec)

Average ProcessingSpeed (one event persecnod)

MIT/LL 2000

LLDOS 1.0DMZ 2498 15.9806

78.8505Inside 905 16.7467

LLDOS 2.0.2DMZ 1125 16.5234

Inside 624 16.0881

Treasure HuntAlpha 732 15.8154

119.8598

Omega 732 15.8154

under the conditions of real-time reasoning lateral movement,this frontage is suitable for deploying in the edge-cloudenvironment.

V. CONCLUSION

In this paper, we propose a new method to track eventsfor Lateral Movement Detection. The concept of vulnerabilitycorrelation is introduced. Methods on how to construct an ERNbased on the vulnerability knowledge and network environ-ment information is provided. Then two lateral movement rea-soning algorithms based on the constructed ERN are presented.The proposed CloudSEC provides a strong guarantee for therapid and effective evidence investigation as well as real-timeattack detection, this advantage is more suitable for thosecomplex edge-cloud computing environments, for example,the services based on the collaboration between the edgeartificial intelligence and the cloud computing. Experimentsusing various real network datasets proves the correctness ofthe proposed approach. Theoretical analysis concludes thatboth chain reasoning algorithms achieve linear time complex-ity. In the future, we aim at improving the performance onERN generation which further improves the overall CloudSECefficiency, at the same time multi-type of lateral movementtricks will be evaluated.

ACKNOWLEDGMENT

This work is supported by the National Natural ScienceFoundation of China under NO. 61572153, NO. 61702220,

NO. 61702223, and NO. U1636215. And the National Key re-search and Development Plan (Grant No. 2018YFB0803504).

REFERENCES

[1] X. Du, M. Guizani, Y. Xiao and H. H. Chen, Transactions papers, ”ARouting-Driven Elliptic Curve Cryptography based Key ManagementScheme for Heterogeneous Sensor Networks,” IEEE Transactions onWireless Communications, Vol. 8, No. 3, pp. 1223-1229, 2009.

[2] Y. Xiao, et al., ”A Survey of Key Management Schemes in WirelessSensor Networks,” Journal of Computer Communications, Vol. 30, Issue11-12, pp. 2314-2341, 2007.

[3] X. Du, Y. Xiao, M. Guizani, and H. H. Chen, ”An Effective KeyManagement Scheme for Heterogeneous Sensor Networks” Ad HocNetworks, Elsevier, Vol. 5, Issue 1, pp 24C34, 2007.

[4] Y. Xiao, et al., ”Internet Protocol Television (IPTV): the Killer Applica-tion for the Next Generation Internet,” IEEE Communications Magazine,Vol. 45, No. 11, pp. 126C134, 2007.

[5] X. Du and H. H. Chen, ”Security in Wireless Sensor Networks” IEEEWireless Communications Magazine, Vol. 15, Issue 4, pp. 60-66, 2008.

[6] Hu Y C, Patel M, Sabella D, et al. Mobile edge computingłA keytechnology towards 5G[J]. ETSI white paper, 11(11). pp. 1-16. 2015.

[7] Tian Z, Su S, Shi W, et al. A data-driven method for future Internet routedecision modeling[J]. Future Generation Computer Systems, 2019.

[8] Tan Q, Gao Y, Shi J, et al. Towards a Comprehensive Insight into theEclipse Attacks of Tor Hidden Services[J]. IEEE Internet of ThingsJournal, 2018.

[9] Jieren Cheng, Ruomeng Xu, Xiangyan Tang, Victor S. Sheng andCanting Cai. An Abnormal Network Flow Feature Sequence PredictionApproach for DDoS Attacks Detection in Big Data Environment. CMC:Computers, Materials & Continua, Vol. 55, No. 1, pp. 095-119, 2018.

[10] Yuling Liu, Hua Peng and Jie Wang. Verifiable Diversity RankingSearch Over Encrypted Outsourced Data. CMC: Computers, Materials& Continua, Vol. 55, No. 1, pp. 037-057, 2018.

[11] Jinhua Cui, Yuanyuan Zhang, Zhiping Cai, Anfeng Liu and YangyangLi. Securing Display Path for Security-Sensitive Applications on MobileDevices. CMC: Computers, Materials & Continua, Vol. 55, No. 1, pp.017-035, 2018.

[12] FANG Binxing, JIA Yan, LI Aiping, ZHANG Weizhe. Cyber Ranges:state-of-the-art and research challenges. Journal of Cyber Security.2016(3)1, pp. 1-9. 2016.

[13] Jia G, Han G, Rao H, et al. Edge Computing-Based Intelligent ManholeCover Management System for Smart Cities. IEEE Internet of ThingsJournal 5(3), pp. 1648-1656. 2018.

[14] Yuan W, He K, Guan D, et al. Edge-Dual Graph Preserving SignPrediction for Signed Social Networks. IEEE Access 5, pp. 19383-19392. 2017.

[15] Zhu C, Leung V C M, Rodrigues J J P C, et al. Social Sensor Cloud:Framework, Greenness, Issues, and Outlook. IEEE Network 32(5), pp.100-105. 2018.

[16] Zhu C, Shu L, Leung V C M, et al. Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City. IEEE Communications Magazine55(12), pp. 24-30. 2017.

[17] Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, andHeng Ye. Significant permission identification for machine learningbased android malware detection. In IEEE Transactions on IndustrialInformatics. IEEE.

[18] Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang. Secure attribute-based data sharing for resource-limited users in cloud computing.Computers & Security, 72, pp. 1-12. 2018.

[19] Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, KaiChen. Privacy-preserving outsourced classification in cloud computing.Cluster Computing, 2017.

[20] Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-MingYiu, Kai Chen. Multi-key privacy-preserving deep learning in cloudcomputing. Future Generation Computer Systems, 2017, 74, pp. 76-85.2017.

[21] Chong-zhi Gao, Qiong Cheng, Xuan Li, Shi-bing Xia. Cloud-assistedprivacy-preserving profile-matching scheme under multiple keys in mo-bile social network. Cluster Computing, 2018.

[22] EnCase Forensic Tool. Available at http://www.guidancesoftware.com.[23] SafeBack Bit Stream Backup Software. Available at

http://www.forensics-intl.com/safeback.html.

Page 9: Real Time Lateral Movement Detection based on …Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment Zhihong Tiany, Wei Shiz, Yuhang

[24] A. Mitchell and G. Vigna. Mnemosyne: Designing and implementingnetwork short-term memory. In International Conference on Engineeringof Complex Computer Systems. IEEE, Dec 2002.

[25] Wang W, Daniels TE. Network forensics analysis with evidence graph.In: Proc. of the 2005 Digital Forensic Research Workshop (DFRWS).New Orleans, 2005.

[26] Zhihong Tian, Wei JIANG, Yang LI. A Transductive Scheme BasedInference Techniques for Network Forensic Analysis. China Communi-cations. 2015.12(2), pp. 167-176. 2015.

[27] Zhihong Tian, Wei Jiang, Yang Li, Lan Dong. A Digital Evidence FusionMethod in Network Forensics Systems with Dempster-Shafer Theory.China Communications. 2014.11(5), pp. 91-97. 2014.

[28] K. Shanmugasundaram, N. Memon, A. Savant, and H. Bronnimann.ForNet: A Distributed Forensics Network. In Proceedings of the SecondInternational Workshop on Mathematical Methods, Models and Archi-tectures for Computer Networks Security, St. Petersburg, Russia, 2003.

[29] R. J.Walls, E. Learned-Miller, and B. N. Levine. Forensic triage formobile phones with DEC0DE. In SEC11 Proceedings of the 20thUSENIX conference on Security, page 7. USENIX Association, aug2011.

[30] Y. Li, S. C. Sundaramurthy, A. G. Bardas, X. Ou, D. Caragea, X. Hu, andJ. Jang. Experimental Study of Fuzzy Hashing in Malware ClusteringAnalysis. In 8th Workshop on Cyber Security Experimentation and Test(CSET 15), 2015.

[31] Y. Liao and V. R. Vemuri. Using text categorization techniques forintrusion detection. In Proceedings of the 11th USENIX Security Sym-posium, August 2002

[32] C. Ko, T. Fraser, L. Badger, and D. Kilpatrick. Detecting and counteringsystem intrusions using software wrappers. In Proceedings of the 9thUSENIX Security Symposium, August 2000.

[33] Garfinkel, Tal & Rosenblum, Mendel. (2003). A Virtual Machine Intro-spection Based Architecture for Intrusion Detection. NDSS. 3.

[34] N. Joseph, S. Sunny, S. Dija, and K. L. Thomas. Volatile InternetEvidence Extraction from Windows Systems. In 2014 IEEE InternationalConference on Computational Intelligence and Computing Research, pp.1C5. 2014.

[35] F. Jiang, YS.Fu, BB. Gupta, F.Lou,S. Rho, F.Meng, ZH.Tian, ”DeepLearning based Multi-channel intelligent attack detection for DataSecurity,” in IEEE Transactions on Sustainable Computing, 2018.