Detecting Structurally Anomalous Logins Within Enterprise Networks

Home / Publications / Detecting Structurally Anomalous Logins Within Enterprise Networks

Hossein Siadati and Nasir Memon
Many network intrusion detection systems use byte sequences to detect lateral movements that exploit remote vulnerabilities. Attackers bypass such detection by stealing valid credentials and using them to transmit from one computer to another without creating abnormal network traffic. We call this method Credential-based Lateral Movement. To detect this type of lateral movement, we develop the concept of a Network Login Structure that specifies normal logins within a given network.