Cyberattacks pose a significant risk, and prevention alone isn’t enough, so timely detection is crucial. That’s why most organizations use SIEM (Security Information and Event Management) systems to centrally collect and analyze security events with expert-written rules for detecting intrusions.
Organizations use SIEM rulesets for intrusion detection, focusing on misuse patterns for known attacks. It’s effective, simple, and aids investigation with detailed alerts.
AMIDES, an open-source Adaptive Misuse Detection System, spots attack-like behavior not caught by SIEM rules.
The following cybersecurity researchers from the respective organizations and universities introduced this new detection system:-
- Rafael Uetz from Fraunhofer FKIE
- Marco Herzog from Fraunhofer FKIE
- Louis Hackländer from Fraunhofer FKIE
- Simon Schwarz from University of Göttingen
- Martin Henze from RWTH Aachen University, Fraunhofer FKIE
It uses supervised learning, classifying events based on similarity to known-malicious or known-harmless activity without the need for a manually extensive attack set. Besides this, the AMIDES identifies potential evasion and suggests the likely evaded SIEM rules.
In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway
AMIDES
SIEMs collect data from source systems in Syslog and Windows Event Log format. Due to data volume, automated threat analysis is essential.
If a threat is detected, a human analyst in a security operations center reviews the alert. Misuse detection, using expert-written rules and signatures, is the primary method for SIEMs to automatically spot malicious activity.
AMIDES enhances SIEM misuse detection in enterprise networks by adding machine learning components to identify rule evasions alongside traditional rule matching.
SIEM events undergo rule matching and feature extraction. The misuse classification component classifies the feature vector as malicious or harmless.
For the training process, this complete system needs the following two key elements:-
- SIEM rules
- Harmless events
It works with existing SIEM rules in organizations using traditional misuse detection, and at the moment, it supports Sigma rules, with potential for Splunk in the future.
This open-source detection system is freely accessible under the GPLv3 license, and it prioritizes performance for large enterprise networks, implemented in Python using:-
By auto-detecting the SIEM rule evasions, AMIDES reduces network blind spots significantly, but effective detection isn’t enough alone.
This work targets SIEM rule evasions creating critical blind spots in enterprise networks. Analyzing open-source SIEM rules, experts found 110 fully evadable and 19 partially evadable rules out of 292, exposing networks to undetected attacks.
This open-source solution is adaptive for misuse detection, extending rule-based detection to identify evasions and bypassed rules. This approach utilizes existing data, making it convenient for enterprise networks.
Experience how StorageGuard eliminates the security blind spots in your storage systems, try a 14-day free trial.