Machine Learning Technology for Detecting Living-Off-the-Land (LOTL) Cyberattacks
Identifying anomalous client–server behavior in network traffic using K-Means clustering and Graph Convolutional Networks.
Summary
This software applies machine learning to detect Living-Off-the-Land (LOTL) cyberattacks by analyzing network traffic rather than command-line data. The system processes Zeek network logs generated from packet captures and converts them into structured features suitable for modeling. A K-Means model first classifies each device as a client or server, after which a Graph Convolutional Network (GCN) learns low-dimensional representations of network behavior. These embeddings are then re-clustered to identify anomalous transitions—patterns where a device begins to behave unexpectedly, such as a client exhibiting server-like activity.
The solution is open and reproducible, designed to enable researchers and practitioners to apply or extend the model in detecting stealthy network-based attacks.
Solution
- Network-Level Detection: Uses Zeek-derived network logs instead of host-based command data.
- Hybrid Modeling Pipeline: Combines K-Means clustering for behavioral labeling with GCN-based embeddings for structural relationship analysis.
- Behavioral Transition Analysis: Flags unusual changes from expected client to server roles within network traffic.
Key Advantages
- Data Accessibility: Operates on widely available Zeek logs instead of restricted command data.
- Improved Stealth Attack Detection: Identifies behavioral shifts characteristic of LOTL activity.
- Reproducible Research: Publicly released to promote transparency and facilitate peer extension.
- Model Flexibility: Framework can be retrained or adapted to new environments and datasets.
Market Applications
- Cybersecurity Operations Centers (CSOCs): Enhancing anomaly detection workflows in network monitoring.
- Research Institutions: Benchmarking and extending LOTL detection methodologies.
- Machine Learning Teams: Applying graph-based learning to network security datasets.
- Cyber Defense Training Environments: Demonstrating LOTL detection techniques using real network data.
Access
This software is available as open-source and can be accessed via the software's GitHub Page.