Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/97046
標題: 建立系統日誌之 TTP 威脅狩獵深度學習模型
A Deep Learning Model for TTP-based Threat Hunting on Windows Audit Logs
作者: 陳廷威
Ting-Wei Chen
指導教授: 孫雅麗
Yea-Li Sun
關鍵字: MITRE ATT&CK,Technique威脅狩獵,溯源圖,深度學習,序列模型,注意力機制,序列標註,
MITRE ATT&CK,Technique-based Threat Hunting,Provenance Graph,Deep Learning,Sequence Model,Attention Mechanism,Sequence Labeling,
出版年 : 2025
學位: 碩士
摘要: 資安風險與威脅是數位時代最大的議題。如何利用有效地惡意威脅活動偵察、即早預警,達到主動式防禦(Proactive Defense),是目前全世界各國各領域的共識與希冀。而達到這個目標,我們認為深度掌握與充分瞭解惡意活動的特徵與所關連的各種系統、網路的資源接觸與操作是達到此目標的關鍵。本研究透過執行惡意攻擊腳本,收集其系統事件紀錄,標記出關鍵的攻擊手法 (Techniques) 等作業與行為特徵,建立MITRE ATT&CK攻擊手法辨識知識庫,並利用此知識庫訓練深度學習模型,進行以Technique為基準的威脅狩獵 (Technique-based Threat Hunting ) 任務。
本研究分為兩階段,第一階段為建立 MITRE ATT&CK Technique 攻擊手法辨識知識庫,第二階段為利用知識庫的資料訓練深度學習模型完成 Technique 威脅狩獵的任務。
在第一階段中,我們首先蒐集MITRE ATT&CK Technique 攻擊手法的系統日誌資料集。我們利用CALDERA 平台以及APT29 Evaluation 提供的多種 MITRE ATT&CK 攻擊手法標籤的攻擊腳本(Abilities),經由執行各個攻擊腳本,與利用Windows作業系統中的 Process Monitor收集其系統日誌(Audit log),並從中標記出關鍵的攻擊手法行為特徵。為了解決系統日誌資料量不足的問題,我們藉由替換攻擊手法行為特徵中的Artifacts(如user name、file name、C2 server IP等),擴增系統日誌資料集。此外,Sigma rules作為偵測Windows系統日誌的標準,也被納入知識庫的一部分。
第二階段的重點在於開發能夠辨識系統日誌中MITRE Techniques攻擊手法的深度學習模型。我們首先將系統日誌建構成溯源圖,溯源圖可以有效地追蹤並理解事件發生的順序和因果關係,為了降低溯源圖的複雜度,我們採用了Causality Preserved Reduction (CPR)技術進行資料縮減。縮減後的資料經由SecureBERT轉換為詞嵌入(Embedding)作為模型輸入。本研究的模型使用序列模型結合注意力機制來進行威脅狩獵任務。此外,本研究探討了如何將由正則表達式(RE)組成的Sigma rules與深度學習模型結合,以增強模型對於Techniques的識別能力。
研究結果顯示,我們的模型可以很好地從系統日誌中辨識出Technique攻擊手法,並且藉由Sigma rules與深度學習模型結合的方式,可以有效改善模型對於特定Techniques的辨識表現。
Cybersecurity risks and threats are among the most pressing issues in the digital age. Achieving proactive defense through effective reconnaissance of malicious activities and early threat detection is a shared goal across nations and industries worldwide. We believe that a deep understanding of the characteristics of malicious activities and their interactions with various system and network resources is key to this goal. In this study, we executed malicious attack scripts to collect system audit logs, identifying MITRE ATT&CK Techniques and behavioral patterns, and constructed a knowledge base of MITRE ATT&CK Techniques. This knowledge base was then used to train deep learning models for Technique-based threat hunting.
The research is divided into two stages. The first stage involves building a comprehensive knowledge base of MITRE ATT&CK Techniques. The second stage focuses on training deep learning models using this knowledge base to perform Technique-based threat hunting tasks.
In the first stage, we collected a dataset of audit logs associated with MITRE ATT&CK Techniques. By leveraging the CALDERA platform and APT29 Evaluation, which provide various labeled attack scripts (abilities) corresponding to MITRE ATT&CK Techniques, we executed these scripts and used the Process Monitor tool in Windows to collect audit logs, identifying key behavioral characteristics of the Techniques. To address the issue of limited audit log data, we augmented the dataset by varying artifacts within the Technique behaviors (e.g., user names, file names, C2 server IPs). Additionally, Sigma rules, widely used for detecting Windows system logs, were incorporated into the knowledge base.
The second stage focuses on developing a deep learning model capable of identifying MITRE Techniques within audit logs. We first constructed provenance graphs from the audit logs to effectively trace and understand the sequence and causal relationships of events. To manage the complexity of these provenance graphs, we employed Causality Preserved Reduction (CPR) techniques for data reduction. The reduced data was then transformed into embeddings via SecureBERT for input into the model. Our model utilizes a sequence-based architecture combined with an attention mechanism to perform threat hunting tasks. Furthermore, this study explores how integrating Sigma rules, composed of regular expressions (RE), with the deep learning model can enhance its ability to identify Techniques.
The results demonstrate that our model can effectively identify MITRE Techniques from audit logs. Additionally, the integration of Sigma rules with the deep learning model significantly improves its performance in recognizing specific Techniques.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/97046
DOI: 10.6342/NTU202500110
全文授權: 同意授權(限校園內公開)
電子全文公開日期: 2025-02-27
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-113-1.pdf
授權僅限NTU校內IP使用(校園外請利用VPN校外連線服務)
8.43 MBAdobe PDF
顯示文件完整紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved