Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats

被引:11
作者
Baksi, Rudra P. [1 ]
Upadhyaya, Shambhu J. [1 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
基金
美国国家科学基金会;
关键词
Advanced Persistent Threats (APT); Computer security; Cyber-security; Hidden Markov Model (HMM); Ransomware;
D O I
10.1007/s10796-020-10087-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deception has been proposed in the literature as an effective defense mechanism to address Advanced Persistent Threats (APT). However, administering deception in a cost-effective manner requires a good understanding of the attack landscape. The attacks mounted by APT groups are highly diverse and sophisticated in nature and can render traditional signature based intrusion detection systems useless. This necessitates the development of behavior oriented defense mechanisms. In this paper, we develop Decepticon (Deception-based countermeasure), a Hidden Markov Model based framework where the indicators of compromise (IoC) are used as the observable features to aid in detection. This theoretical framework also includes several models to represent the spread of APTs in a computer system. The presented framework can be used to select an appropriate deception script when faced with APTs or other similar malware and trigger an appropriate defensive response. The effectiveness of the models in a networked system is illustrated by considering a real APT type ransomware.
引用
收藏
页码:897 / 913
页数:17
相关论文
共 51 条
[1]  
[Anonymous], 2013, POISON IVY ASSESSING
[2]  
Baksi R. P., 2017, ARXIV171200841
[3]  
Baksi RudraPrasad., 2018, Proceedings of the International Conference on Security and Management (SAM), P245
[4]   The Cousins of Stuxnet: Duqu, Flame, and Gauss [J].
Bencsath, Boldizsar ;
Pek, Gabor ;
Buttyan, Levente ;
Felegyhazi, Mark .
FUTURE INTERNET, 2012, 4 (04) :971-1003
[5]  
Bishop Matt., 2008, CSIIRW 08, P1, DOI [DOI 10.1145/1595676.1595678?ACCESSTAB=TRUE, 10.1145/1595676.1595678?accessTabtrue, DOI 10.1145/1595676.1595678?ACCESSTABTRUE]
[6]  
Bizga A, 2020, RANSOMWARE ATTACK CO
[7]   Deception-Based Game Theoretical Approach to Mitigate DoS Attacks [J].
Ceker, Hayreddin ;
Zhuang, Jun ;
Upadhyaya, Shambhu ;
La, Quang Duy ;
Soong, Boon-Hee .
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 :18-38
[8]  
Clark Z., 2017, The worm that spreads wanacrypt0r
[9]  
Correspondent T., 2020, TIMES INDIA
[10]  
Costan V., 2016, IACR Cryptology ePrint Archive