AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Detecting anomalies in login activities is a critical step in response to credential-based lateral movement attacks. Although attackers with compromised credentials can impersonate legal users and move laterally between computers without triggering the alarm, his login activities would likely deviate from the users’ normal patterns. We propose AGE, an Authentication Graph Embedding based anomalous login activities detection system. The goal of authentication graph embedding is to capture comprehensive relationships that facilitate the construction of user profiles. Specifically, the user profiles contain three types of features: the familiarity-related features, the similarity-related features, and the lateral movement walks-related features. To evaluate AGE thoroughly, we use our synthetic malicious lateral movement traces as well as red team activities provided by CMU-CERT. Extensive experiments show that AGE achieves good performance and outperforms the baseline methods. Moreover, we also design experiments that will help us understand the authentication graph embedding.

Cite

CITATION STYLE

APA

Wei, R., Cai, L., Yu, A., & Meng, D. (2020). AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11999 LNCS, pp. 341–356). Springer. https://doi.org/10.1007/978-3-030-41579-2_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free