Distributed Temporal Graph Learning with Provenance for APT Detection in Supply Chains
By: Zhuoran Tan, Christos Anagnostopoulos, Jeremy Singer
Potential Business Impact:
Finds sneaky computer attacks hidden in software.
Cyber supply chain, encompassing digital asserts, software, hardware, has become an essential component of modern Information and Communications Technology (ICT) provisioning. However, the growing inter-dependencies have introduced numerous attack vectors, making supply chains a prime target for exploitation. In particular, advanced persistent threats (APTs) frequently leverage supply chain vulnerabilities (SCVs) as entry points, benefiting from their inherent stealth. Current defense strategies primarly focus on prevention through blockchain for integrity assurance or detection using plain-text source code analysis in open-source software (OSS). However, these approaches overlook scenarios where source code is unavailable and fail to address detection and defense during runtime. To bridge this gap, we propose a novel approach that integrates multi-source data, constructs a comprehensive dynamic provenance graph, and detects APT behavior in real time using temporal graph learning. Given the lack of tailored datasets in both industry and academia, we also aim to simulate a custom dataset by replaying real-world supply chain exploits with multi-source monitoring.
Similar Papers
APT-CGLP: Advanced Persistent Threat Hunting via Contrastive Graph-Language Pre-Training
Cryptography and Security
Finds sneaky computer hackers using smart AI.
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection
Cryptography and Security
Finds hidden computer attacks using smart AI.
PROVSYN: Synthesizing Provenance Graphs for Data Augmentation in Intrusion Detection Systems
Cryptography and Security
Makes computers better at finding sneaky hackers.