Skip Navigation
Search

Back to Search Innovations

Real-time APT Detection through Correlation of Suspicious Information Flows


A system designed for real-time detection of Advanced Persistent Threat (APT) campaigns for real-time detection

Tech Image

Anthony Brown, https://stock.adobe.com/uk/images/209686850, stock.adobe.com

Background


Advanced Persistent Threats (APTs) represent a critical cybersecurity challenge, characterized by their multi-stage nature, extended duration, and stealthy operations across numerous hosts within an enterprise network. These sophisticated attacks, often carried out by skilled adversaries, are difficult for conventional anti-malware and intrusion detection systems to identify, as they typically involve a series of low-level, seemingly innocuous events that, when combined, reveal a coordinated campaign. A primary difficulty lies in efficiently generating meaningful alerts from vast volumes of low-level host logs and network traffic without producing excessive noise, which can overwhelm security analysts. Furthermore, correlating these disparate alerts—originating from various activities and across different systems over time—into a reliable signal indicative of an ongoing APT campaign remains a substantial hurdle for existing approaches. Finally, even when potential indicators are present, effectively communicating a high-level, intuitive summary of the attack scenario to human analysts in real-time, enabling them to quickly grasp the scope and magnitude for effective response, is a persistent challenge.

Technology


Researchers at Stony Brook University and University of Illinois have developed HOLMES, a system designed for real-time detection of Advanced Persistent Threat (APT) campaigns, processing host logs and IPS alerts from an enterprise. It generates alerts from low-level event traces, focusing on significant attacker steps while minimizing noise. These alerts are then correlated by leveraging suspicious information flows across multiple attacker activities and by correlating tactics, techniques, and procedures used across APT stages, to produce a reliable signal indicating an ongoing APT campaign. Concurrently, HOLMES generates a high-level graph that summarizes the attacker's actions and the overall attack scenario in real-time, providing an intuitive overview for cyber-analysts to facilitate effective response.

Advantages

  • Real-time detection and high-level attack visualization
  • Efficient correlation of suspicious information flows
  • Low false alarm rates
  • Integration with existing intrusion detection systems

Application

  • Enterprise APT Detection Software
  • Managed Security Service Provider (MSSP) Offerings
  • Cyber Incident Response and Forensics Support
  • Specialized Government and Critical Infrastructure Security Solutions

Inventors

R. Sekar, SUNY Empire Innovation Professor and Associate Chair, Computer Science
V.N. Venkatakrishnan, Professor,
Rigel Gjomemo, ,
Birhanu Eshete, ,
Sadegh Momeni, ,

Licensing Potential


Development partner - Commercial partner - Licensing

Licensing Status


Available 

Licensing Contact

James Martino, Licensing Specialist, Intellectual Property Partners, james.martino@stonybrook.edu,

Patent Status


Provisional Application Filed

Stage of Development


System Available

Tech ID

050-9059