Semantic Processing of Security Event Streams (SEPSES)
Semantic Processing of Security Event Streams (SEPSES)
Disciplines
Computer Sciences (100%)
Keywords
-
Security,
Semantic Stream Processing,
Event Modeling,
Reasoning,
Log Integration,
Attack Patterns
As complex IT systems are becoming more and more deeply ingrained in our everyday lives, their integrity and operation is threated by increasingly sophisticated attacks. Relatively simple user activities (such as logging into an online banking system, using a communication service etc.) often require a complex series of steps that provide a surface for attacks. Therefore, events are usually documented and, along with general information about the system state, stored in extensive log files. The overwhelming volume of these disparate logs, which need to be monitored constantly, poses a major challenge for security analysts. At present, these logs are often scattered across systems and are not comprehensible for computers. Therefore, monitoring them for clues of attacks cannot easily be automated. In large systems with many users, where manual monitoring is infeasible, many security incidents are therefore only identified with considerable delay or, even worse, not at all. The project SEPSES takes an innovative approach to tackle these challenges. It enables computers to integrate and interpret streams of log information from many sources in real time. This allows computers to reason about potential malicious activities and support security analysts in identifying, tracing, and eliminating threats in a timely manner. To this end, SEPSES unifies theories from security research, data stream processing technologies, and methods developed in the Linked Data and Semantic Web research communities. To facilitate continuous real time monitoring of complex event streams, a set of conceptual and technical challenges need to be overcome. First, large-volume data streams must be combined and converted into a machine-understandable representation. This requires modeling security knowledge in a way that can be interpreted by computers. Second, event streams need to be integrated and consolidated at a central location. This will facilitate context-rich methods that go beyond searching for individual events. Hence, it will become possible to link individual isolated events and conduct context-aware analyses. Overall, this will result in a comprehensive view on system activities, allow security analysts to derive explanations for observed behaviors, and make it possible to identify attack patterns automatically. Methods developed in the course of SEPSES provide a foundation for learning of new attack patterns and the continuous exchange of dynamic security knowledge. This could, for instance, result in a public collection of known attack patterns in the Linked Open Data Cloud that anyone can subscribe to. Moreover, the developed methods form the basis for advanced diagnostic methods and will provide a platform for innovative security applications such as comprehensible visualization of sequences of malicious events, semantic forensic analyses, and structurally rich log data mining.
The digitalisation of all aspects of our lives comes with a critical dependence on information technologies, which are facing increasingly sophisticated attacks that threaten their confidentiality, integrity, and availability. To detect and respond to such attacks, it is necessary to collect and analyze information about activities - which are typically stored in log files. These files may provide clues about malicious activities, but the overwhelming volume of these logs poses a major challenge for security researchers and analysts. At present, such textual logs come in various formats and are scattered across systems. Therefore, monitoring them for clues of attacks cannot easily be automated and thus, many security incidents are only identified with considerable delay, if at all. To tackle these challenges, the research project SEPSES aimed to automatically transform log data from disparate sources into a knowledge graph and to enrich this graph with information about threats, weaknesses, vulnerabilities, and countermeasures. Once log data has been extracted and transformed this way, it becomes possible to establish links between seemingly unrelated events - such as sequences of steps in an attack - and to search for patterns that provide clues about malicious activities. This new approach to analyze log data aimed to improve detection, understanding, and response to threats. To achieve this goal, SEPSES combined security research with semantic technologies and knowledge-based approaches in order to develop techniques to harmonize and integrate large, heterogeneous log data into a machine-interpretable representation. In order to provide an integrated perspective, it was necessary to develop a formal description of the events typically covered in log files. This made it possible to search for generic patterns of malicious activities, not only in local log archives, but also across machines and platforms in distributed environments, for which we developed a virtual knowledge graph approach. The concepts, methods, and resources that result from the project provide a foundation for the development of comprehensive tooling for semantic security analyses. Through integration, automation, contextualization, and automated machine-interpretation, such tooling can contribute towards increased situational awareness, reduced alert fatigue, and fast response times in the future. The developed methods also support the exchange of security knowledge, provide new concepts for the discovery of novel attack patterns, and create a foundation for further security research, e.g., into graph-based machine learning techniques to analyze log data.
- Dietmar Winkler, Technische Universität Wien , associated research partner
Research Output
- 575 Citations
- 22 Publications
- 2 Methods & Materials
- 2 Datasets & models
- 6 Disseminations
- 1 Scientific Awards
- 4 Fundings
-
2019
Title Semantic Integration and Monitoring of File System Activity Type Conference Proceeding Abstract Author Ekelhart A. Conference Proceedings of the Posters and Demo Track of the 15th International Conference on Semantic Systems Link Publication -
2021
Title Virtual Knowledge Graphs for Federated Log Analysis DOI 10.1145/3465481.3465767 Type Conference Proceeding Abstract Author Kurniawan K Pages 1-11 -
2024
Title Semantic-enabled architecture for auditable privacy-preserving data analysis DOI 10.3233/sw-212883 Type Journal Article Author Ekaputra F Journal Semantic Web Pages 675-708 Link Publication -
2019
Title Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook DOI 10.1007/978-3-030-25312-7_14 Type Book Chapter Author Eckhart M Publisher Springer Nature Pages 383-412 -
2023
Title Improving Cybersecurity through Semantic Log Monitoring, Analysis and Attack Reconstruction Type PhD Thesis Author Kabul Kurniawan Link Publication -
2020
Title Automated knowledge graph construction from raw log data? Type Other Author Ekaputra F.J. Pages 205-209 Link Publication -
2018
Title Semantic Query Federation for Scalable Security Log Analysis DOI 10.1007/978-3-319-98192-5_48 Type Book Chapter Author Kurniawan K Publisher Springer Nature Pages 294-303 -
2018
Title Towards Security-Aware Virtual Environments for Digital Twins DOI 10.1145/3198458.3198464 Type Conference Proceeding Abstract Author Eckhart M Pages 61-72 -
2018
Title Taming the logs - Vocabularies for semantic security analysis DOI 10.1016/j.procs.2018.09.011 Type Journal Article Author Ekelhart A Journal Procedia Computer Science Pages 109-119 Link Publication -
2018
Title A Specification-based State Replication Approach for Digital Twins DOI 10.1145/3264888.3264892 Type Conference Proceeding Abstract Author Eckhart M Pages 36-47 -
2021
Title An attandck-kg for linking cybersecurity attacks to adversary tactics and techniques? Type Other Author Ekelhart A. Pages - Link Publication -
2021
Title An ATT&CK-KG for linking cybersecurity attacks to adversary tactics and techniques Type Conference Proceeding Abstract Author Ekelhart A. Conference Proceedings of the ISWC 2021 Posters, Demos and Industry Tracks Link Publication -
2020
Title Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach DOI 10.1007/978-3-030-58201-2_26 Type Book Chapter Author Kurniawan K Publisher Springer Nature Pages 384-397 -
2019
Title Semantic integration and monitoring of file system activity Type Other Author Ekelhart A. Pages - Link Publication -
2022
Title KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data DOI 10.1016/j.cose.2022.102828 Type Journal Article Author Kurniawan K Journal Computers & Security Pages 102828 -
2022
Title VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis DOI 10.3390/make4020016 Type Journal Article Author Kurniawan K Journal Machine Learning and Knowledge Extraction Pages 0-0 Link Publication -
2023
Title Improving cybersecurity through semantic log monitoring, analysis and attack reconstruction DOI 10.25365/thesis.73214 Type Other Author Kurniawan K Link Publication -
2019
Title Finding Non-compliances with Declarative Process Constraints Through Semantic Technologies DOI 10.1007/978-3-030-21297-1_6 Type Book Chapter Author Di Ciccio C Publisher Springer Nature Pages 60-74 -
2019
Title The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity DOI 10.1007/978-3-030-30796-7_13 Type Book Chapter Author Kiesling E Publisher Springer Nature Pages 198-214 -
2019
Title Creating a Vocabulary for Data Privacy DOI 10.1007/978-3-030-33246-4_44 Type Book Chapter Author Pandit H Publisher Springer Nature Pages 714-730 -
2021
Title The SLOGERT Framework for Automated Log Knowledge Graph Construction DOI 10.1007/978-3-030-77385-4_38 Type Book Chapter Author Ekelhart A Publisher Springer Nature Pages 631-646 -
2020
Title Automated Knowledge Graph construction from raw log data Type Conference Proceeding Abstract Author Ekaputra F. Conference Proceedings of the ISWC 2020 Demos and Industry Link Publication
-
2021
Link
Title KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data Type Improvements to research infrastructure Public Access Link Link -
2021
Link
Title SLOGERT (Semantic LOG ExtRaction Templating) approach Type Improvements to research infrastructure Public Access Link Link
-
2018
Link
Title Project Website and GitHub Type Engagement focused website, blog or social media channel Link Link -
2019
Title Poster Sessions in industrial tracks Type A talk or presentation -
2019
Title Research Center Partner event Type Participation in an activity, workshop or similar -
2018
Title NetIdee events Type Participation in an activity, workshop or similar -
2018
Link
Title netidee blog Type Engagement focused website, blog or social media channel Link Link -
2017
Link
Title diePresse newspaper article Type A press release, press conference or response to a media enquiry/interview Link Link
-
2019
Title ISWC Spotlight paper Type Poster/abstract prize Level of Recognition Continental/International
-
2019
Title (KnowGraphs) - Knowledge Graphs at Scale Type Studentship Start of Funding 2019 Funder European Commission -
2021
Title Teaming.AI (H2020 ICT-38) Type Research grant (including intramural programme) Start of Funding 2021 Funder European Commission -
2018
Title Expedite - EXPloring opportunities and challenges for Emerging personal DaTa Ecosystems Type Research grant (including intramural programme) Start of Funding 2018 Funder Austrian Research Promotion Agency -
2021
Title Digital Twins for Cyber-Physical Threat Detection & Response Type Research grant (including intramural programme) Start of Funding 2021 Funder Austrian Research Promotion Agency