Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks

被引:14
作者
Ajmal, Abdul Basit [1 ]
Alam, Masoom [1 ]
Khaliq, Awais Abdul [1 ]
Khan, Shawal [1 ]
Qadir, Zakria [2 ]
Mahmud, M. A. Parvez [3 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Cyber Secur Lab, Islamabad 44500, Pakistan
[2] Western Sydney Univ, Sch Comp Engn & Math, Penrith, NSW 2751, Australia
[3] Deakin Univ, Sch Engn, Geelong, Vic 3216, Australia
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Security; Tools; SCADA systems; Protocols; Process control; Open source software; Licenses; Threat hunting; indicators of compromise (IOC); Industrial Internet of Things (IIoT); supervisory control and data acquisition (SCADA); cyber deception; honeypots; decoys;
D O I
10.1109/ACCESS.2021.3111420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus and EDR (End Point Detection and Response) aim to detect and prevent threats; such security mechanisms are reactive. This approach did not prove to be effective in protecting against stealthy attacks. SCADA (Supervisory Control and Data Acquisition) security is crucial for any country. However, SCADA is always an easy target for adversaries due to a lack of security for heterogeneous devices. An attack on SCADA is mainly considered a national-level threat. Recent research on SCADA security has not considered "unknown threats," which has left a gap in security. The proactive approach, such as threat hunting, is the need of the hour. In this research, we investigated that threat hunting in conjunction with cyber deception and kill chain has countervailing effects on detecting SCADA threats and mitigating them. We have used the concept of "decoy farm" in the SCADA network, where all attacks are engaged. Moreover, we present a novel threat detection and prevention approach for SCADA, focusing on unknown threats. To test the effectiveness of approach, we emulated several SCADA, Linux and Windows based attacks on a simulated SCADA network. We have concluded that our approach detects and prevents the attacker before using the current reactive approach and security mechanism for SCADA with enhanced protection for heterogeneous devices. The results and experiments show that the proposed threat hunting approach has significantly improved the threat detection ability.
引用
收藏
页码:126789 / 126800
页数:12
相关论文
共 51 条
  • [1] Activecm, ACT REAL INT THREAT
  • [2] Activecm, ACTIVECM REAL INTELL
  • [3] Ajmal A. B., 2021, IEEE ACCESS, DOI [10.1109/ACCESS.2021.3104260, DOI 10.1109/ACCESS.2021.3104260]
  • [4] Al-Rabiaah S, 2018, 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), DOI 10.1109/NCG.2018.8593143
  • [5] Awad Y., 2018, P 2018 IEEE INT C CO, P1, DOI DOI 10.1109/ICC.2018.8422083
  • [6] A framework for effective threat hunting
    Bhardwaj A.
    Goundar S.
    [J]. Network Security, 2019, 2019 (06): : 15 - 19
  • [7] Bhunia S. S, 2017, 2017 27 INT TEL NETW, P1
  • [8] Biham E., 2019, P BLACK HAT US
  • [9] Bright P., 2016, ARS TECHNICA, V24, P110
  • [10] Brown R., 2019, The evolution of cyber threat intelligence (cti): 2019 sans cti survey