DKaaS: DARK-KERNEL as a service for active cyber threat intelligence

被引:2
|
作者
Charan, P. V. Sai [1 ]
Ratnakaram, Goutham [2 ]
Chunduri, Hrushikesh [1 ]
Anand, P. Mohan [1 ]
Shukla, Sandeep Kumar [1 ]
机构
[1] Indian Inst Technol, Kanpur 208016, Uttar Pradesh, India
[2] CISCO Syst India Pvt Ltd, Bangalore 560103, Karnataka, India
关键词
Active darknet monitoring; Threat intelligence; Kernel tracing; DARK-KERNEL as a service; DARKPOT;
D O I
10.1016/j.cose.2023.103329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence(CTI) plays an indispensable role in providing evidence-based knowledge to plan defensive strategies against advanced cyber attacks. Most threat intelligence data originate from secu-rity researchers, vendor blogs, list of threat indicators, and commercial cyber security firms. However, as attack surfaces become more dynamic and threat actors shift towards organization/sector-specific at-tacks, generic threat information is no longer adequate to safeguard against these targeted attacks. In such scenarios, darknet data can be an invaluable source of threat information at the enterprise level as in darknet, the traffic is destined for a range of unused IP addresses. As these IP addresses are un -used, the traffic destined for them is considered suspicious and can serve as a valuable source for threat intelligence. Darknet monitoring is done in either active or passive mode. Passive darknet monitoring gives generic information without active engagement with the attacker devices. So, we developed a novel method for gathering threat intelligence via active darknet monitoring by designing a kernel-level dark -net sensor that engages incoming traffic by establishing a 3-way handshake. We called it DARK-KERNEL in our previous work. This work aims to implement DARK-KERNEL as a Service (DKaaS) for organization-level threat intelligence. To achieve this, we deploy the DARK-KERNEL by assigning four unused public IP addresses. We gather 37 days of traffic and provide a comprehensive analysis of captured data using Security Onion and several automated scripts. In addition, we highlight a few attacks to define the ef-fectiveness of DKaaS. Finally, we propose a novel framework that integrates DKaaS with a customizable Security Orchestration and Response (SOAR) engine to deploy behavioral honeypots to lure sophisticated attackers.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [42] Towards Safe Cyber Practices: Developing a Proactive Cyber-Threat Intelligence System for Dark Web Forum Content by Identifying Cybercrimes
    Sangher, Kanti Singh
    Singh, Archana
    Pandey, Hari Mohan
    Kumar, Vivek
    INFORMATION, 2023, 14 (06)
  • [43] Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)
    Samtani, Sagar
    Chen, Hsinchun
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2149 - 2150
  • [44] Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution
    Saxena, Rashi
    Gayathri, E.
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 682 - 689
  • [45] Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
    Zhang, Ning
    Ebrahimi, Mohammadreza
    Li, Weifeng
    Chen, Hsinchun
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (02)
  • [46] MAD-CTI: Cyber Threat Intelligence Analysis of the Dark Web Using a Multi-Agent Framework
    Shah, Sayuj
    Madisetti, Vijay K.
    IEEE ACCESS, 2025, 13 : 40158 - 40168
  • [47] A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence
    Koloveas, Paris
    Chantzios, Thanasis
    Tryfonopoulos, Christos
    Skiadopoulos, Spiros
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 3 - 8
  • [48] Coordinating uncertainty in the political economy of cyber threat intelligence
    Slayton, Rebecca
    Muller, Lilly
    SOCIAL STUDIES OF SCIENCE, 2025,
  • [49] Human-AI Enhancement of Cyber Threat Intelligence
    Cohen, Daniel
    Te'eni, Dov
    Yahav, Inbal
    Zagalsky, Alexey
    Schwartz, David
    Silverman, Gahl
    Mann, Yossi
    Elalouf, Amir
    Makowski, Jeremy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (02)
  • [50] A success model for cyber threat intelligence management platforms
    Zibak, Adam
    Sauerwein, Clemens
    Simpson, Andrew
    COMPUTERS & SECURITY, 2021, 111