OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs

Generative AI & LLMs
Published: arXiv: 2510.15188v1
Authors

Ahmed Aly Essam Mansour Amr Youssef

Abstract

Advanced Persistent Threats (APTs) are stealthy cyberattacks that often evade detection in system-level audit logs. Provenance graphs model these logs as connected entities and events, revealing relationships that are missed by linear log representations. Existing systems apply anomaly detection to these graphs but often suffer from high false positive rates and coarse-grained alerts. Their reliance on node attributes like file paths or IPs leads to spurious correlations, reducing detection robustness and reliability. To fully understand an attack's progression and impact, security analysts need systems that can generate accurate, human-like narratives of the entire attack. To address these challenges, we introduce OCR-APT, a system for APT detection and reconstruction of human-like attack stories. OCR-APT uses Graph Neural Networks (GNNs) for subgraph anomaly detection, learning behavior patterns around nodes rather than fragile attributes such as file paths or IPs. This approach leads to a more robust anomaly detection. It then iterates over detected subgraphs using Large Language Models (LLMs) to reconstruct multi-stage attack stories. Each stage is validated before proceeding, reducing hallucinations and ensuring an interpretable final report. Our evaluations on the DARPA TC3, OpTC, and NODLINK datasets show that OCR-APT outperforms state-of-the-art systems in both detection accuracy and alert interpretability. Moreover, OCR-APT reconstructs human-like reports that comprehensively capture the attack story.

Paper Summary

Problem
Advanced Persistent Threats (APTs) are sophisticated cyberattacks that evade detection by exploiting zero-day vulnerabilities and maintaining long-term access through low-profile tactics. Detecting and reconstructing these attacks from system-level audit logs remains a significant challenge for security analysts. Current systems often generate fragmented outputs or overly technical graphs that are difficult to parse and interpret.
Key Innovation
The OCR-APT system addresses these challenges by introducing a novel approach that combines Graph Neural Networks (GNNs) and Large Language Models (LLMs) for APT detection and reconstruction. OCR-APT uses GNNs for subgraph anomaly detection, learning behavior patterns around nodes rather than fragile attributes like file paths or IPs. This approach leads to a more robust anomaly detection. The system then iterates over detected subgraphs using LLMs to reconstruct multi-stage attack stories.
Practical Impact
OCR-APT has the potential to significantly improve APT detection and investigation. By providing comprehensive and interpretable reports that map to APT attack stages, OCR-APT can help security analysts to better understand the progression and impact of attacks. This can lead to more effective incident response, reduced dwell time, and improved security posture. Moreover, OCR-APT's ability to reconstruct human-like reports can facilitate collaboration and communication among security teams, law enforcement, and other stakeholders.
Analogy / Intuitive Explanation
Imagine trying to solve a complex puzzle with many pieces that are connected in different ways. Traditional approaches to APT detection focus on individual pieces (e.g., file paths or IPs), which can lead to incomplete or inaccurate solutions. OCR-APT, on the other hand, uses GNNs to analyze the relationships between pieces and identify patterns that indicate a larger problem. This is like looking at the puzzle from a higher level, seeing the connections between pieces, and understanding how they fit together to form a complete picture.
Paper Information
Categories:
cs.CR cs.LG
Published Date:

arXiv ID:

2510.15188v1

Quick Actions