EAGLEEYE: Attention to Unveil Malicious Event Sequences From Provenance Graphs

Page view(s)
7
Checked on Apr 17, 2025
EAGLEEYE: Attention to Unveil Malicious Event Sequences From Provenance Graphs
Title:
EAGLEEYE: Attention to Unveil Malicious Event Sequences From Provenance Graphs
Journal Title:
2024 APWG Symposium on Electronic Crime Research (eCrime)
Publication Date:
25 February 2025
Citation:
Gysel, P., Wüest, C., Nwafor, K., Jašek, O., Ustyuzhanin, A., & Divakaran, D. M. (2024). EAGLEEYE: Attention to Unveil Malicious Event Sequences From Provenance Graphs. 2024 APWG Symposium on Electronic Crime Research (ECrime), 27–42. https://doi.org/10.1109/ecrime66200.2024.00009
Abstract:
Securing endpoints is challenging due to the evolving nature of threats and attacks. With endpoint logging systems becoming mature, provenance-graph representations enable the creation of sophisticated behavior rules. However, adapting to the pace of emerging attacks is not scalable with rules. This led to the development of ML models capable of learning from endpoint logs. However, there are still open challenges: i) malicious patterns of malware are spread across long sequences of events, and ii) ML classification results are not interpretable. To address these issues, we develop and present EAGLEEYE, a novel system that i) uses rich features from provenance graphs for behavior event representation, including command-line embeddings, ii) extracts long sequences of events and learns event embeddings, and iii) trains a lightweight Transformer model to classify behavior sequences as malicious or not. We evaluate and compare EAGLEEYE against state-of-the-art baselines on two datasets, namely a new real-world dataset from a corporate environment, and the public DARPA dataset. On the DARPA dataset, at a false-positive rate of 1%, EAGLEEYE detects ≈89% of all malicious behavior, outperforming two state-of-the-art solutions by an absolute margin of 38.5%. Furthermore, we show that the Transformer's attention mechanism can be leveraged to highlight the most suspicious events in a long sequence, thereby providing interpretation of malware alerts.
License type:
Publisher Copyright
Funding Info:
There was no specific funding for the research done
Description:
© 2025 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
ISSN:
979-8-3315-2449-4
Files uploaded:

File Size Format Action
eagleeye-final-2024.pdf 902.93 KB PDF Request a copy