We conducted extensive experiments with One-
Class SVM and Local Outlier Factor algorithms, us-
ing different configurations of their hyperparameters
and features extracted from Windows Events. As the
results have shown, ML approach significantly re-
duced the number of false-positive detections com-
pared to the signature-based approach. At the same
time, we did not observe an increase in the number of
false negatives.
Furthermore, at the same percentage level of false
positives, the One-Class SVM algorithm helped im-
prove detection capabilities, as it detected one attack
that was missed by the static rule. LOF algorithm has
not proven to be equally effective but offers the ad-
vantage of no need for training data.
ACKNOWLEDGEMENTS
This work was supported by the Student Summer
Research Program 2020 of FIT CTU in Prague and
the grant no. SGS20/212/OHK3/3T/18. The au-
thors acknowledge the support of the OP VVV MEYS
funded project CZ.02.1.01/0.0/0.0/16 019/0000765
”Research Center for Informatics”.
REFERENCES
Breunig, M., Kriegel, H.-P., Ng, R., and Sander, J. (2000).
LOF: Identifying density-based local outliers. In ACM
Sigmod Record, volume 29, pages 93–104.
Desmond, B., Richards, J., Allen, R., and Lowe-Norris,
A. G. (2013). Active Directory: Designing, Deploy-
ing, and Running Active Directory, chapter 1-2, 9-10.
O’Reilly Media, 5 edition.
Goldstein, M., Asanger, S., Reif, M., and Hutchison,
A. (2013). Enhancing Security Event Management
Systems with Unsupervised Anomaly Detection. In
ICPRAM, pages 530–538.
Hsieh, C., Lai, C., Mao, C., Kao, T., and Lee, K. (2015).
AD2: Anomaly detection on active directory log
data for insider threat monitoring. In 2015 Interna-
tional Carnahan Conference on Security Technology
(ICCST), pages 287–292.
Kotlaba, L., Buchoveck
´
a, S., and L
´
orencz, R. (2020). Ac-
tive Directory Kerberoasting Attack: Monitoring and
Detection Techniques. In Proceedings of the 6th Inter-
national Conference on Information Systems Security
and Privacy, ICISSP 2020, Valletta, Malta, February
25-27, 2020, pages 432–439. SCITEPRESS.
Matsuda, W., Fujimoto, M., and Mitsunaga, T. (2018). De-
tecting APT attacks against Active Directory using
Machine Leaning. In 2018 IEEE Conference on Ap-
plication, Information and Network Security (AINS),
page 60–65.
Medin, T. (2014). Attacking Microsoft Kerberos Kicking
the Guard Dog of Hades. In DerbyCon 4.0, Louisville,
USA.
Meijerink, M. (2019). Anomaly-based Detection of Lat-
eral Movement in a Microsoft Windows Environ-
ment. Master’s thesis, Faculty of Electrical Engineer-
ing, Mathematics & Computer Science, University of
Twente, 7500 AE Enschede, The Netherlands.
Metcalf, S. (2017a). Active Directory Security. https:
//adsecurity.org/. [Online; accessed on 14-September-
2020].
Metcalf, S. (2017b). Active Directory Security: Detect-
ing Kerberoasting Activity. https://adsecurity.org/?p=
3458. [Online; accessed on 14-September-2020].
Microsoft Corporation (2017). Microsoft Docs: Se-
curity auditing: 4769(S, F): A Kerberos service
ticket was requested. https://docs.microsoft.com/
en-us/windows/security/threat-protection/auditing/
event-4769. [Online; accessed on 14-September-
2020].
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V.,
Thirion, B., Grisel, O., Blondel, M., Prettenhofer,
P., Weiss, R., Dubourg, V., Vanderplas, J., Passos,
A., Cournapeau, D., Brucher, M., Perrot, M., and
Duchesnay, E. (2011). Scikit-learn: Machine learning
in Python. Journal of Machine Learning Research,
12:2825–2830.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V.,
Thirion, B., Grisel, O., Blondel, M., Prettenhofer,
P., Weiss, R., Dubourg, V., Vanderplas, J., Pas-
sos, A., Cournapeau, D., Brucher, M., Perrot, M.,
and Duchesnay, E. (2020). Scikit-learn: Novelty
and outlier detection. https://scikit-learn.org/stable/
modules/outlier detection.html. [Online; accessed on
14-September-2020].
Sch
¨
olkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J.,
and Platt, J. (1999). Support vector method for novelty
detection. In NIPS, volume 12, pages 582–588.
Soria-Machado, M., Abolins, D., Boldea, C., and
Socha, K. (2016). Kerberos Golden Ticket
Protection. Technical report, CERT-EU Secu-
rity Whitepaper 2014–007. Also available at
http://cert.europa.eu/static/WhitePapers/UPDATED%
20-%20CERT-EU
Security Whitepaper 2014-007
Kerberos Golden Ticket Protection v1 4.pdf [On-
line; accessed on 14-September-2020].
Splunk Inc. (2020). Splunk Documentation. https://docs.
splunk.com/Documentation. [Online; accessed on 14-
September-2020].
The Mitre Corporation (2020). Steal or Forge Ker-
beros Tickets: Kerberoasting. https://attack.mitre.
org/techniques/T1558/003/. [Online; accessed on 14-
September-2020].
Uppstr
¨
omer, V. and R
˚
aberg, H. (2019). Detecting Lateral
Movement in Microsoft Active Directory Log Files.
Master’s thesis, Faculty of Computing, Blekinge In-
stitute of Technology, 371 79 Karlskrona, Sweden.
Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques
383