DKaaS: DARK-KERNEL as a service for active cyber threat intelligence

被引:2
|
作者
Charan, P. V. Sai [1 ]
Ratnakaram, Goutham [2 ]
Chunduri, Hrushikesh [1 ]
Anand, P. Mohan [1 ]
Shukla, Sandeep Kumar [1 ]
机构
[1] Indian Inst Technol, Kanpur 208016, Uttar Pradesh, India
[2] CISCO Syst India Pvt Ltd, Bangalore 560103, Karnataka, India
关键词
Active darknet monitoring; Threat intelligence; Kernel tracing; DARK-KERNEL as a service; DARKPOT;
D O I
10.1016/j.cose.2023.103329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence(CTI) plays an indispensable role in providing evidence-based knowledge to plan defensive strategies against advanced cyber attacks. Most threat intelligence data originate from secu-rity researchers, vendor blogs, list of threat indicators, and commercial cyber security firms. However, as attack surfaces become more dynamic and threat actors shift towards organization/sector-specific at-tacks, generic threat information is no longer adequate to safeguard against these targeted attacks. In such scenarios, darknet data can be an invaluable source of threat information at the enterprise level as in darknet, the traffic is destined for a range of unused IP addresses. As these IP addresses are un -used, the traffic destined for them is considered suspicious and can serve as a valuable source for threat intelligence. Darknet monitoring is done in either active or passive mode. Passive darknet monitoring gives generic information without active engagement with the attacker devices. So, we developed a novel method for gathering threat intelligence via active darknet monitoring by designing a kernel-level dark -net sensor that engages incoming traffic by establishing a 3-way handshake. We called it DARK-KERNEL in our previous work. This work aims to implement DARK-KERNEL as a Service (DKaaS) for organization-level threat intelligence. To achieve this, we deploy the DARK-KERNEL by assigning four unused public IP addresses. We gather 37 days of traffic and provide a comprehensive analysis of captured data using Security Onion and several automated scripts. In addition, we highlight a few attacks to define the ef-fectiveness of DKaaS. Finally, we propose a novel framework that integrates DKaaS with a customizable Security Orchestration and Response (SOAR) engine to deploy behavioral honeypots to lure sophisticated attackers.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction
    Shakarian, Paulo
    INFORMATION, 2018, 9 (12):
  • [2] Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning
    Kadoguchi, Masashi
    Hayashi, Shota
    Hashimoto, Masaki
    Otsuka, Akira
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 200 - 202
  • [3] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [4] Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence
    Basheer, Randa
    Alkhatib, Bassel
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2021, 2021
  • [5] Customer-oriented ranking of cyber threat intelligence service providers
    Noor, Umara
    Anwar, Zahid
    Altmann, Jorn
    Rashid, Zahid
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2020, 41
  • [6] Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool
    Arnold, Nolan
    Ebrahimi, Mohammadreza
    Zhang, Ning
    Lazarine, Ben
    Patton, Mark
    Chen, Hsinchun
    Samtani, Sagar
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 92 - 97
  • [7] Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence
    Kadoguchi, Masashi
    Kobayashi, Hanae
    Hayashi, Shota
    Otsuka, Akira
    Hashimoto, Masaki
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 163 - 168
  • [8] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [9] Cyber Threat Intelligence for "Things"
    Wagner, Thomas D.
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [10] Unifying Cyber Threat Intelligence
    Menges, Florian
    Sperl, Christine
    Pernul, Guenther
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175