AISecOps£º´ÓDARPA TCÏîÄ¿¿´Öն˹¥·À
2020-08-24
Çå¾²½çÏßÈÕ񾀣ºý£¬ÎªÓ¦¶Ô¸ß¼¶Ò»Á¬ÐÔÍþв£¬ÌáÉýÖÖÖÖÖÕ¶ËϵͳµÄ“͸Ã÷¶È”ÓÈΪҪº¦——ͨ¹ý¸ßЧµÄÊý¾ÝÊÕÂÞÓëÆÊÎöÊÖÒÕ£¬ÒÔʶ±ð¡¢ËÝÔ´¡¢Õ¹ÍûÄÚÍⲿ¹¥»÷ÕßµÄϸÁ£¶Èϵͳ¼¶ÐÐΪ¼°¹ØÁªÆäÉÏÏÂÎÄ¡£È»¶øµ±ÎÒÃÇʵÑéÓ÷Ŵó¾µÊÓ²ìϸÁ£¶ÈµÄϵͳÐÐΪʱ£¬Êý¾ÝÖÊÁ¿¡¢ÆÊÎöÊÖÒÕ¡¢ÐÔÄÜ¿ªÏú¡¢ÑéÖ¤ÀíÂ۵ȶàÌõÀíµÄÎÊÌâ½Óõà¶øÖÁ¡£
ÃÀ¹ú¹ú·À¸ß¼¶Ñо¿ÍýÏë¾Ö£¨Defense Advanced Research Projects Agency, DARPA£©ÔËÓªÁ˶à¸öÖØÁ¿¼¶µÄÍøÂç¿Õ¼äÇå¾²Ñо¿ÏîÄ¿£¬ÕÙ¼¯ÁËÖî¶àÃÀ¹ú¶¥¼¶Ñо¿»ú¹¹¼ÓÈ룬¿ÉνÊǼ¯ÖÐʵÁ¦°ì´óÊ¡£ÆäÖУ¬Í¸Ã÷ÅÌË㣨Transparent Computing, TC£©ÏîÄ¿ÕýÊÇÆÚÍûͨ¹ý»ùÓÚÖÕ¶ËÊý¾ÝµÄÊÕÂÞÓëÆÊÎöÔöÇ¿ÖÕ¶ËÉÏϵͳϸÁ£¶ÈÐÐΪµÄ¿ÉÊÓÄÜÁ¦£¬ÒÔʵÏÖÆóÒµ¼¶ÍøÂç¿Õ¼äAPT¼ì²â¡¢È¡Ö¤µÈÒªº¦Ê¹Ãü¡£Õ¾ÔÚ¾ÞÈ˵ļç°òÉÏ£¬´Ó¸ÃÏîÄ¿µÄһϵÁй¥·À¶Ô¿¹Ä£ÄâʵսÖУ¬Äܹ»Ò»¿úÃÀ¹ú¶¥¼¶Öն˹¥·ÀÄÜÁ¦µÄ½»·æ¡£×óÓÒ»¥²«£¬¹¥·ÀÏ೤£¬ÊÇAISecOpsÖÇÄÜÇå¾²ÔËÓªÊÖÒÕµü´úµÄ±ØÓÉ֮·¡£±¾ÎĽ«¹éÄÉ×ÛºÏDAPRA TCÏîÄ¿µÄ»ù±¾ÇéÐΣ¬ÆÊÎö×ܽáÆäºìÀ¶¶Ô¿¹ÑÝÁ·µÄÊÖÒÕÄÜÁ¦Ìص㡣ÆÚÍûÄܹ»Îª¶ÁÕß´øÀ´È«ÐµÄÊÓ½ÇÓë˼Ë÷¡£
Ò»¡¢DARPA TCÏîÄ¿¸ÅÊö
No.1ÏîĿĿµÄ
ÏÖ´ú²Ù×÷ϵͳµÄ¹¦Ð§Âß¼Ô½À´Ô½ÖØ´ó£¬ÅÌËãϵͳµÄµÍ͸Ã÷¶È³ÉΪϸÄ廯¼Í¼¡¢ÆÊÎö¡¢Õ¹Íûϵͳ¼¶±ðÐÐΪµÄÖ÷ÒªÏÞÖÆ£¬¶ø¹Ø±ÕµÄϵͳºÚºÐΪ¾ßÓиßÒþ²ØÐÔ¡¢¸ß¶Ô¿¹ÐÔµÄAPT¹¥»÷ÕßÌṩÁ˾ø¼ÑµÄDZÔÚ³¡ºÏ¡£ÎªÁË·¿ªÏµÍ³ÐÐΪºÚºÐ£¬ÊµÏÖÔڽϵͿªÏúÏÂÌṩϵͳ¸÷²ã¼¶Èí¼þÄ£¿éÐÐΪ¿É¼ûÐÔ£¬DAPRA×éÖ¯ÁËTransparent ComputingÏîÄ¿[1]¡£¸ÃÏîÄ¿µÄÄ¿µÄÊÖÒÕ¼°ÏµÍ³ÐèʵÏÖ£º
ÊÕÂÞ¡¢ÉúÑÄϵͳ×é¼þ£¨ÊäÈë¡¢Èí¼þÄ£¿é¡¢Àú³ÌµÈ£©µÄËÝÔ´Êý¾Ý£»
¶¯Ì¬×·×ÙÍøÂ·ÏµÍ³×é¼þµÄ½»»¥ÓëÒò¹ûÒÀÀµ¹ØÏµ£»
ÕûºÏÊý¾ÝÒÀÀµ£¬²â»æ¶Ëµ½¶ËµÄϵͳÐÐΪ£»
´Óȡ֤ºÍʵʱ¼ì²âµÄ½Ç¶È£¬ÊµÏÖ¶ÔϵͳÐÐΪµÄÍÆÀí¡£
»ùÓÚÒÔÉÏÄÜÁ¦µÄʵÏÖ£¬TCÏîĿּÔÚÍê³ÉϸÁ£¶Èϵͳ¼¶ÐÐΪµÄ¹ØÁª£¬ÊµÏÖÔÚ´ó¹æÄ£ÐÐΪÖÐʶ±ðÒì³£Óë¶ñÒâÒâͼ£¬·¢Ã÷DZÔÚµÄAPT»òÆäËû¸ß¼¶Íþв£¬²¢ÌṩÍêÕûµÄËÝÔ´ÆÊÎöÓëÏà¹ØËðʧÆÀ¹À¡£Í¬Ê±£¬TCÏîÄ¿Äܹ»ÊµÏÖÍøÂçÍÆÀíÄÜÁ¦ÓëÆóÒµ¹æÄ£ÍøÂç¼à¿ØºÍ¹Ü¿ØÏµÍ³µÄÕûºÏ£¬ÒÔÔöǿҪº¦½ÚµãµÄÇå¾²Õ½ÂÔÓÐÓÃÐÔ¡£
No.2ÏîÄ¿ÊÖÒÕÁìÓò»®·Ö

´Ó2016Äê10Ôµ½2019Äê5Ô£¬DARPA TCÏîÄ¿¹²×éÖ¯ÁË5´Î½Ï´ó¹æÄ£µÄºìÀ¶¶Ô¿¹Õ÷Õ½ÑÝϰ£¨Engagement£©¡£ÔÚÿ´Î¶Ô¿¹ÖУ¬TC×ܹ²»®·ÖΪ5¸öÊÖÒÕÓò£¨Technical Areas, TAs£©¡£»®·ÖÊÇ£º
TA1-Tagging and Tracking£¬ÈÏÕæÑз¢µÍ¿ªÏúµÄϵͳÐÐΪÊÕÂÞÊÖÒÕÓëϵͳ£¬ÒÔÖ§³ÖºóÐøµÄÆÊÎöʹÃü£¬ÊÕÂÞϵͳÐèÖ§³ÖLinux¡¢Windows¡¢BSD¡¢AndroidµÈ¶àÀàÐͲÙ×÷ϵͳ£»
TA2-Detection and Policy Enforcement£¬ÈÏÕæÌṩ֪×ãʵʱ»òȡ֤ÐèÇóµÄ¹¥»÷µÄ¼ì²â¡¢¹ØÁª¡¢ËÝÔ´ÊÖÒÕÓëϵͳ£»
TA3-Architecture£¬ÈÏÕæÕûÌåµÄϵͳ¼Ü¹¹Éè¼Æ£¬ÎªTA1/TA2ÍŶÓÌṩÐ×÷µÄ»ù´¡ÉèÊ©£¬°üÀ¨ÍøÂç¡¢´æ´¢µÈ»·½Ú£»
TA4-Scenario Development£¬ÈÏÕæÍ³³ïÉè¼Æ¹¥»÷³¡¾°£¬ÒÔÁýÕÖ¸ü¶àµÄAPTÀàÐÍ£»
TA5.1-Adversarial Challenge Team (ACT)£¬ÈÏÕæAPT¹¥»÷ÐÐΪģÄâ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Ã¿¸öÊÖÒÕ·Ö×éÄÚ£¬Óжà¸ö²î±ðµÄÍŶӼÓÈë¡£ÀýÈçTA1£¬°üÀ¨CADETS£¨Causal Adaptive Distributed and Efficient Tracing System£©¡¢ClearScope£¨Õë¶Ô°²×¿Òƶ¯ÖÕ¶Ë£©¡¢THEIA£¨Tagging and Tracking of Multi-Level Host Events for Transparent Computing and Information Assurance£©µÈϵͳʵÏÖ¡£TA2Ôò°üÀ¨À´×ÔUIUC¡¢Stony BrookµÈ¸ßУ£¬ÒÔ¼°IBM¡¢NECµÈÆóÒµµÄÇå¾²ÆÊÎöÍŶӡ£¿ÉÒÔ˵£¬TCÏîĿΪһ³¡³¤ÖÜÆÚ¡¢¶àÂִΡ¢¶à¸ßˮƽÍŶӼÓÈëµÄ´ó¹æÄ£¹¥·ÀÑÝÁ·ÌṩÁËͳһµÄƽ̨¡£
¶þ¡¢DARPA TC¹¦ÊصÀ
No.1¹¥——ϸÄ帻ºñµÄAPT³¡¾°Ä£Äâ
δ֪¹¥ÑÉÖª·À£¬Ã¿Ò»ÂÖ³¤´ï¼¸ÖܵĹ¥·À¶Ô¿¹ÖУ¬Îª½¨Éè±ÆÕæµÄÍøÂç¹¥·ÀÇéÐΣ¬ÔÚÒ»Á¬µÄÅä¾°Á¼ÐÔÊý¾ÝÖУ¬ÓÉTA4Éè¼Æ¡¢TA5.1Ä£ÄâÁ˳¤ÖÜÆÚ¡¢¶àÖÖÀà¡¢¿ç¶àƽ̨µÄAPT¹¥»÷ÐÐΪ¡£ÒÔEngagement 3ΪÀý£¬Ö÷Òª°üÀ¨Á½À๥»÷Õߣ¬Nation State¹¥»÷ÕßÖ÷ҪĿµÄÊǰбêÆóÒµÖеÄ֪ʶ²úȨºÍСÎÒ˽¼ÒÊý¾Ý£»Common Threat¹¥»÷ÕßÖ÷ҪĿµÄÊÇ͵ȡPII£¨Personally Identifiable Information£©Êý¾ÝÒÔ»ñÈ¡¾¼Ã¼ÛÖµ¡£ÒÔϼͼÁËEngagement 3ÖеIJ¿·Ö¹¥»÷ÀàÐ͵ÄÏà¹Ø±êÇ©[2]£¬Õⲿ·ÖÊý¾Ý°üÀ¨ÁË3Àà²Ù×÷ϵͳ£¬Ã¿ÖÖ²Ù×÷ÏÏû³ÁýÕÖÈýÀ๥»÷³¡¾°£¬Õû¸öʱ¼ä¿ç¶ÈÁè¼Ý20Ìì¡£ÕâЩ¹¥»÷³¡¾°£¬Äܹ»ÁýÕֵ䷶APT¹¥»÷ÕßµÄ7²½¹¥»÷Á´£¬²¢°üÀ¨¸»ºñµÄÏêϸ¹¥»÷ÒªÁ죬ÀýÈç·´Éä¼ÓÔØ£¨Reflective Loading£©¡¢webshell¡¢ÎÞÎļþ¹¥»÷µÈ¡£

¸üÏêϸµÄ£¬Ï±íö¾ÙÁËEngagement 3/4Öм¸¸öµä·¶µÄ¹¥»÷³¡¾°[4]£º

ÔÚ´ó¹æÄ£µÄÊÂÎñÊý¾Ý»ã×ÜÖУ¬¹¥»÷Êý¾ÝµÄ¹æÄ£Õ¼±È¿ÉÄܵÍÓÚ0.001%£¬Òò´ËÕâЩģÄâÌìÉúµÄ¹¥»÷ÐÐΪ¼ì²â£¬¾ßÓÐ×ã¹»µÄÒþ²ØÐÔºÍµÍÆµÐÔ¡£
±ðµÄ£¬TA5.1ʵÏÖÁ˰üÀ¨Carbanak¡¢Uroburos¡¢DustySky¡¢OceanLotus¡¢njRAT¡¢HawkEye¡¢DeputyDogµÈ¶àÖÖ¶ñÒâÈí¼þÔÚ¹¥·Àƽ̨ÖеÄͶ·Å¡£DARPA TCµÄ¹¥»÷Ä£ÄâÕ¹ÏÖÁ˼ÓÈëÍŶÓÔÚAPT¼¼Õ½ÊõµÄÉîÖ¿»ýÀÛ¡£ÕûÌåÉÏÀ´¿´£¬¹¥·½µÄ¼¼Õ½ÊõÉè¼ÆÓÐÈçÏÂÌØµã£¬ÁýÕÖ¹¥»÷Ä£ÄâµÄ¹ã¶ÈÓëÉî¶È£º
ÁýÕÖ³¡¾°¸»ºñ£¨¹ã¶È£©¡£TA5.1ÍŶÓÄ£ÄâµÄ¹¥»÷ÔÚAPT³¡¾°¡¢¶ñÒâÈí¼þÀàÐÍ¡¢²Ù×÷ϵͳƽ̨ÀàÐÍ¡¢¹¥»÷ÃæÀàÐÍ¡¢¹¥»÷½×¶Î¡¢¹¥»÷ÖÜÆÚµÈ¶à¸öά¶ÈÉÏ£¬¾ßÓкá×ÝÏòµÄÖÜÈ«ÁýÕÖ¡£
¹¥»÷»¹Ô¶È¸ß£¨Éî¶È£©¡£»ùÓÚÏà¹ØÍþвÇ鱨¼°APTÐÐΪÑо¿£¬¹¥»÷³¡¾°µÄÉè¼ÆºÍÖ´ÐÐÍŶÓÄܹ»ÓÐÓû¹Ô¹¥»÷¼¼Õ½ÊõÄÜÁ¦¡£Í¬Ê±ÔÚÁ¼ÐÔÐÐΪģÄâ·½Ãæ£¬Ò²³ä·Ö˼Á¿ÁËÈçÒ³Ãæ»á¼û¼°ÏÂÔØ¡¢ÏµÍ³Ê¹Ãü¡¢Èí¼þ±àÒë¼°×°Öõȣ¬´Ó¶øÄܽÏΪ׼ȷ»¹Ô¸»ºñµÄÆóÒµÓªÒµ³¡¾°¡£ÔÚÊý¾Ý¹æÄ£±ÈÀýÉÏ£¬Ò²ÎªÆÊÎöÍŶÓÖÆÔìÁË“´óº£ÀÌÕ딵ÄAPT¼ì²âÄÑÌâ¡£
No.2ÊØ——·¿ªÐÐΪ“ºÚÏä”
TA1~3ÊÖÒÕÁìÓòÍŶÓÈÏÕæ´Óϵͳ¹¹½¨¡¢Êý¾ÝÊÕÂÞ¡¢Êý¾ÝÆÊÎöµÄ·ÀÊØ»·½Ú¡£TCÏîÄ¿µÄÖØµãÔÚÓÚ¼ì²â¡¢Ê¶±ðºÍËÝÔ´£¬Òò´Ë²¢Î´¿´µ½Ö´ÐÐʵʱ×è¶ÏµÈÏìÓ¦»·½ÚʵÏÖ¡£ÔÚÊý¾ÝÊÕÂÞÉÏ£¬Ïà¹ØÍŶÓʹÓðüÀ¨Auditd¡¢Dtrace¡¢ETWµÈ²î±ðƽ̨µÄϵͳÐÐΪÊÕÂÞ»úÖÆ£¬ÊµÏÖÁ˸÷×ÔµÄÊÕÂÞ¡¢±ê¼Çϵͳ¡£ÆäÖУ¬×î½¹µãµÄÊý¾Ý¾ÍÊDzî±ðÀàÐÍÖն˵ÄËÝÔ´Êý¾Ý£¨Provenance£©£¬ÓÐÓõÄËÝÔ´Êý¾ÝÍÚ¾òÒªÁ죬Äܹ»Ö§³ÖÍþвá÷ÁԵĶàÖÖʹÃü³¡¾°¡£ProvenanceÄܹ»ÖÒʵ¼Í¼ÖÕ¶ËÉÏʵÌåµÄÐÐΪÂß¼ÒÀÀµ¹ØÏµ£¬×ÔÈ»ÐγÉËÝÔ´Êý¾Ýͼ£¨Provenance Graph£¬¼ò³ÆËÝԴͼ£©¡£

»ùÓÚ´ó¹æÄ£ËÝÔ´Êý¾Ýͼʶ±ðAPT¹¥»÷ÐÐΪ£¬ÃæÁÙËÝÔ´ÒÀÀµÍ¼±¬Õ¨¡¢Íþв´óº£ÀÌÕë¡¢ÐÔÄÜÍØÕ¹ÐÔ²îµÈ¶à·½ÃæµÄÊÖÒÕÌôÕ½¡£ÎªÍ»ÆÆÕâЩÊÖÒÕÄÑÌ⣬ÔÚËÝԴͼÆÊÎöÒªÁìÉÏ£¬TA2ÍŶÓÖ÷Òª·ÖΪÁ½´óÃÅ»§£¬»®·ÖÊÇÆô·¢Ê½Õ½ÂÔÅɺÍÊý¾ÝÆÊÎöÅÉ¡£Æô·¢Ê½Õ½ÂÔÅÉÖ÷Ҫͨ¹ýÊý¾Ý¡¢ÐÐΪ±êÇ©»¯¼°Æô·¢Ê½Èö²¥¹æÔò£¬ÊµÏÖÒªº¦ÐÅÏ¢Á÷µÄ½¨Ä££¬µä·¶ÊÖÒÕÒªÁì°üÀ¨HOLMES¡¢MORSEµÈ£»Êý¾ÝÆÊÎöÅÉ£¬ÔòÇ¿µ÷Êý¾ÝÍÚ¾òÒªÁ죬ͨ¹ýͳ¼ÆÓë»úеѧϰ£¬´ÓÒì³£ÈëÊÖÕç±ðÕæÊµÍþвÓëÎ󱨣¬µä·¶ÊÖÒÕÒªÁì°üÀ¨NODOZE¡¢HERCULEµÈ¡£×ÜÌåÀ´Ëµ£¬ÖÖÖÖÆÊÎöÒªÁìÄܹ»Õë¶ÔTCÖеIJî±ð¹¥»÷³¡¾°ÊµÏֽϸߵļì³ö¡¢»¹Ô׼ȷÂÊ£¬µ«ÉÐδ¿´µ½ÈκÎÒ»ÖÖÒªÁìÄܹ»·ÅÖ®Ëĺ£½Ô×¼£¬Ò»Í³ÌìÏ¡£¿ÉÒÔÔ¤¼ûµÄÊÇ£¬¶àά¶ÈµÄ¼ì²âÆÊÎöÒýÇæµÄÈںϣ¬²¢ÂòͨÈË-»úÐͬµÄ±Õ»··´Ï죬ÊÇÔÚ´ó¹æÄ£ÖÕ¶ËÊý¾ÝÓ¿ÈëÆÊÎö³¡¾°ÏµıØÓÉ֮·¡£Öն˲àµÄÇå¾²ÔËÓªÓëÆÊÎö£¬ÐèÒª¼æ¹Ë´¦Öóͷ£Ð§ÂÊ¡¢Êý¾ÝÒþ˽¡¢ÆÊÎö׼ȷÐԵȶàά¶ÈÒòËØ£¬²Å»ªÓÐÓôٳÉÖÕ¶ËÆÊÎöÄÜÁ¦µÄÂ䵨¡£
Èý¡¢×ܽá
DARPA Transparent ComputingÏîÄ¿´î½¨µÄºìÀ¶¶Ô¿¹ÑÝÁ·Îę̀£¬ÎüÒýÁËÃÀ¹úÖն˹¥·ÀÁìÓòµÄ¶¥¼¶ÍŶӼÓÈ룬Ҳ´Ù³ÉÁËÖÕ¶ËÍþвÆÊÎöÁìÓòѧÊõÑо¿Ó빤ҵÊÖÒյĿìËÙÑݽø¡£´Ó×éÖ¯¼Ü¹¹£¬µ½¹¥»÷·½¼¼Õ½ÊõʵÑ飬ÔÙµ½·ÀÊØ·½¶àάÊÕÂÞ¡¢ÆÊÎö¼Æ»®£¬ÓÐÐí¶àÖµµÃ½è¼øµÄʵÏÖ¡£Öն˲àµÄÍøÂç¹¥·À£¬ÒѳÉΪ¸ß¼¶Íþв¶Ô¿¹ÁìÓòµÄÖ÷Õ½³¡¡£¸ßЧÊÕÂÞÓëϸÄåµÄÆÊÎöÆë·É£¬À´·¿ªÖÕ¶ËϵͳµÄÅÌËãºÚºÐ£¬·½ÄÜÒòµÐת±äȡʤ¡£
· ²Î¿¼ÎÄÏ× ·
[1]https://www.darpa.mil/program/transparent-computing
[2]Milajerdi S M, Gjomemo R, Eshete B, et al. Holmes: real-time apt detection through correlation of suspicious information flows[C]. 2019 IEEE Symposium on Security and Privacy (SP), 2019: 1137-1152.
[3]Hossain M N, Sheikhi S, Sekar R. Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics[J].
[4]Pei K, Gu Z, Saltaformaggio B, et al. Hercule: Attack story reconstruction via community discovery on correlated log graph[C]. Proceedings of the 32Nd Annual Conference on Computer Security Applications, 2016: 583-595.
[5]Hassan W U, Guo S, Li D, et al. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage[C]. NDSS, 2019.

¾ÅÓÎÀϸçÔÆ







