Improving Threat Detection Capabilities in Windows Endpoints with Osquery

Akshay Bakshi, Tanish Sawant, Prasad Thakare, Azeez Dandawala,Manjesh K. Hanawal, Atul Kabra

2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)(2023)

引用 1|浏览1
暂无评分
摘要
Good visibility of system events is one of the important requirements in detecting malicious attacks. For Windows systems, Sysmon and Event Trace for Windows (ETW) are popular to obtain logs of system activities. However, both of them do not provide `evented' activity logs which can result in failed detections, especially when malicious attacks are of short span. In evented-activity-logs, operating system information is aggregated asynchronously at event time and make them available at the query time hence providing better contextual information about events. In this work, we build on the open-source log collection tool Osquery and enhance it to collect evented-activity-logs. Using our custom Osquery we demonstrate the detection of attacks based on process hollowing techniques that Microsoft Defender fails to detect.
更多
查看译文
关键词
Osquery,Windows,Process Hollowing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要