An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
By: Rujie Dai , Peizhuo Lv , Yujiang Gui and more
Potential Business Impact:
Finds hidden computer attacks and explains them clearly.
Advanced Persistent Threats (APTs) are prolonged, stealthy intrusions by skilled adversaries that compromise high-value systems to steal data or disrupt operations. Reconstructing complete attack chains from massive, heterogeneous logs is essential for effective attack investigation, yet existing methods suffer from poor platform generality, limited generalization to evolving tactics, and an inability to produce analyst-ready reports. Large Language Models (LLMs) offer strong semantic understanding and summarization capabilities, but in this domain they struggle to capture the long-range, cross-log dependencies critical for accurate reconstruction. To solve these problems, we present an LLM-empowered attack investigation framework augmented with a dynamically adaptable Kill-Chain-aligned threat knowledge base. We organizes attack-relevant behaviors into stage-aware knowledge units enriched with semantic annotations, enabling the LLM to iteratively retrieve relevant intelligence, perform causal reasoning, and progressively expand the investigation context. This process reconstructs multi-phase attack scenarios and generates coherent, human-readable investigation reports. Evaluated on 15 attack scenarios spanning single-host and multi-host environments across Windows and Linux (over 4.3M log events, 7.2 GB of data), the system achieves an average True Positive Rate (TPR) of 97.1% and an average False Positive Rate (FPR) of 0.2%, significantly outperforming the SOTA method ATLAS, which achieves an average TPR of 79.2% and an average FPR of 29.1%.
Similar Papers
A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends
Cryptography and Security
Finds hidden computer spies and their global patterns.
APT-CGLP: Advanced Persistent Threat Hunting via Contrastive Graph-Language Pre-Training
Cryptography and Security
Finds sneaky computer hackers using smart AI.
TPPR: APT Tactic / Technique Pattern Guided Attack Path Reasoning for Attack Investigation
Cryptography and Security
Finds hidden computer attack paths better.