Hopper: Modeling and Detecting Lateral Movement

TitleHopper: Modeling and Detecting Lateral Movement
Publication TypeConference Paper
Year of Publication2021
AuthorsHo, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., & Wagner D.
Published inProceedings of the 30th USENIX Security Symposium
Page(s)3093-3110
Date Published08/2021
PublisherUSENIX Association
ISBN Number978-1-939133-24-3
Abstract

In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious sequences of logins that correspond to lateral movement. To understand the larger context of each login, Hopper employs an inference algorithm to identify the broader path(s) of movement that each login belongs to and the causal user responsible for performing the logins. Hopper then leverages this path inference algorithm, in conjunction with a set of detection rules and a new anomaly scoring algorithm, to surface the login paths most likely to reflect lateral movement. On a 15-month enterprise dataset consisting of over 780 million internal logins, Hopper achieves a 94.5% detection rate across over 300 realistic attack scenarios, including one red team attack, while generating an average of <9 alerts per day. In contrast, to detect the same number of attacks, prior state-of-the-art systems would need to generate nearly 8x as many false positives.

URLhttps://www.usenix.org/system/files/sec21-ho.pdf