论文标题
KELLECT:基于内核的高效且无损的事件日志收集器,用于Windows Security
Kellect: a Kernel-Based Efficient and Lossless Event Log Collector for Windows Security
论文作者
论文摘要
最近,经常发生APT攻击,对于传统的安全检测模型而言,这越来越复杂且更具挑战性。系统日志对于网络安全分析至关重要,这主要是由于其系统行为的有效重建能力。现有的日志收集工具构建了ETW的Windows,遭受了工作短缺的影响,包括数据丢失,高架开销和实时性能较弱。因此,应用基于ETW的Windows工具来分析APT攻击方案仍然非常困难。 为了应对这些挑战,本文提出了一个名为Kellect的高效且无损的内核日志收集器,该收集器已通过www.kellect.org的Project开源。通过通过多级高速缓存解决方案动态优化缓存和处理线程的数量,仅需2%-3%和大约40MB内存消耗即可进行额外的CPU使用。通过用滑动指针替换TDH库,Kellect增强了分析性能,至少达到了现有工具效率的9倍。此外,Kellect提高了与不同的OS版本的兼容性。此外,KELLECT通过维护事件映射和应用程序呼叫站来增强日志语义理解,从而为安全行为分析提供了更全面的特征。 通过大量实验,Kellect展示了其实现非破坏性,实时和完整收集的内核日志数据的能力,该数据从事件中生成的内核日志数据的全面效率比现有工具高9倍。作为一个杀手级的插图,可以显示Kellect如何适用于APT,已将完整的数据日志收集为数据集kellect4apt,该数据日志是通过实现最新ATT&CK的TTP生成的。据我们所知,这是代表特定于ATT&CK技术行为的第一个开放基准数据集,高度期望这可以改善对APT研究的更广泛的研究。
Recently, APT attacks have frequently happened, which are increasingly complicated and more challenging for traditional security detection models. The system logs are vital for cyber security analysis mainly due to their effective reconstruction ability of system behavior. existing log collection tools built on ETW for Windows suffer from working shortages, including data loss, high overhead, and weak real-time performance. Therefore, It is still very difficult to apply ETW-based Windows tools to analyze APT attack scenarios. To address these challenges, this paper proposes an efficient and lossless kernel log collector called Kellect, which has open sourced with project at www.kellect.org. It takes extra CPU usage with only 2%-3% and about 40MB memory consumption, by dynamically optimizing the number of cache and processing threads through a multi-level cache solution. By replacing the TDH library with a sliding pointer, Kellect enhances analysis performance, achieving at least 9 times the efficiency of existing tools. Furthermore, Kellect improves compatibility with different OS versions. Additionally, Kellect enhances log semantics understanding by maintaining event mappings and application callstacks which provide more comprehensive characteristics for security behavior analysis. With plenty of experiments, Kellect demonstrates its capability to achieve non-destructive, real-time and full collection of kernel log data generated from events with a comprehensive efficiency of 9 times greater than existing tools. As a killer illustration to show how Kellect can work for APT, full data logs have been collected as a dataset Kellect4APT, generated by implementing TTPs from the latest ATT&CK. To our knowledge, it is the first open benchmark dataset representing ATT&CK technique-specific behaviors, which could be highly expected to improve more extensive research on APT study.