Kkk
Kkk
APTs are stealthy, long-term cyberattacks often carried out by highly skilled
groups, including nation-state actors. These groups target critical infrastruc-
tures, organizations, or governments, aiming to steal data, perform espi-
onage, or disrupt operations.
What sets APTs apart from traditional attacks is their 'low-and-slow' ap-
proach. Instead of acting quickly and noticeably, they operate over weeks,
months, or even years, making minimal changes to avoid detection. Addi-
tionally, they often exploit zero-day vulnerabilities—unknown security flaws—
making them nearly impossible to stop with signature-based systems.
The primary challenge in detecting APTs lies in their stealth and prolonged
nature. These attacks operate in such a way that they blend into the normal
behavior of a system.
"Let’s talk about how UNICORN advances the state of the art in intrusion
detection.
"Let’s take a closer look at how UNICORN works in practice. This flowchart
gives a high-level overview of the process.
"Let’s take a closer look at provenance graphs, which form the backbone
of UNICORN’s detection system.
This is where graph sketching comes into play. UNICORN uses a technique
called HistoSketch to compress large provenance graphs into fixed-size
representations, or 'sketches.' These sketches summarize the essential fea-
tures of the graph while discarding redundant information.
"Let’s now discuss how UNICORN was implemented to handle the complexi-
ties of real-world systems.
"Let’s now discuss the results, starting with the StreamSpot dataset, which
is used as a baseline for comparison.
"Finally, let’s look at the Simulated Supply Chain dataset, which mimics
APTs targeting software delivery pipelines.
"Now that we’ve seen the strengths and capabilities of UNICORN, let’s take a
moment to acknowledge its limitations.
"Looking toward the future, there are several exciting developments and
emerging trends in the field of provenance-based detection that could en-
hance UNICORN’s capabilities even further.
In summary, the field is evolving rapidly, and there are exciting opportunities
to expand provenance-based detection into new domains and enhance its
capabilities with machine learning and other advanced techniques."
"To wrap up, UNICORN is a transformative system that leverages the power
of provenance-based anomaly detectionto effectively detect Advanced
Persistent Threats. Let’s recap the key points:
Thank you very much for your time and attention. I’m happy to take any
questions you might have."