OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs
2510.15188v2
cs.CR, cs.LG
2025-10-21
Авторы:
Ahmed Aly, Essam Mansour, Amr Youssef
Abstract
Advanced Persistent Threats (APTs) are stealthy cyberattacks that often evade
detection in system-level audit logs. Provenance graphs model these logs as
connected entities and events, revealing relationships that are missed by
linear log representations. Existing systems apply anomaly detection to these
graphs but often suffer from high false positive rates and coarse-grained
alerts. Their reliance on node attributes like file paths or IPs leads to
spurious correlations, reducing detection robustness and reliability. To fully
understand an attack's progression and impact, security analysts need systems
that can generate accurate, human-like narratives of the entire attack. To
address these challenges, we introduce OCR-APT, a system for APT detection and
reconstruction of human-like attack stories. OCR-APT uses Graph Neural Networks
(GNNs) for subgraph anomaly detection, learning behavior patterns around nodes
rather than fragile attributes such as file paths or IPs. This approach leads
to a more robust anomaly detection. It then iterates over detected subgraphs
using Large Language Models (LLMs) to reconstruct multi-stage attack stories.
Each stage is validated before proceeding, reducing hallucinations and ensuring
an interpretable final report. Our evaluations on the DARPA TC3, OpTC, and
NODLINK datasets show that OCR-APT outperforms state-of-the-art systems in both
detection accuracy and alert interpretability. Moreover, OCR-APT reconstructs
human-like reports that comprehensively capture the attack story.
Ссылки и действия
Дополнительные ресурсы: