首页> 外文会议>International Conference on Computer and Knowledge Engineering >Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
【24h】

Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement

机译:移动目标防御以抵御高级持久性威胁,从而增强网络安全性

获取原文

摘要

One of the main security concerns of enterprise-level organizations which provide network-based services is combating with complex cybersecurity attacks like advanced persistent threats (APTs). The main features of these attacks are being multilevel, multi-step, long-term and persistent. Also they use an intrusion kill chain (IKC) model to proceed the attack steps and reach their goals on targets. Traditional security solutions like firewalls and intrusion detection and prevention systems (IDPSs) are not able to prevent APT attack strategies and block them. Recently, deception techniques are proposed to defend network assets against malicious activities during IKC progression. One of the most promising approaches against APT attacks is Moving Target Defense (MTD). MTD techniques can be applied to attack steps of any abstraction levels in a networked infrastructure (application, host, and network) dynamically for disruption of successful execution of any on the fly IKCs. In this paper, after presentation and discussion on common introduced IKCs, one of them is selected and is used for further analysis. Also, after proposing a new and comprehensive taxonomy of MTD techniques in different levels, a mapping analysis is conducted between IKC models and existing MTD techniques. Finally, the effect of MTD is evaluated during a case study (specifically IP Randomization). The experimental results show that the MTD techniques provide better means to defend against IKC-based intrusion activities.
机译:提供基于网络的服务的企业级组织的主要安全问题之一是与复杂的网络安全攻击(例如高级持久性威胁(APT))作斗争。这些攻击的主要特征是多层次,多步骤,长期和持续的。他们还使用入侵杀伤链(IKC)模型来进行攻击步骤并达到目标。诸如防火墙和入侵检测与防御系统(IDPS)之类的传统安全解决方案无法阻止APT攻击策略并加以阻止。近来,提出了欺骗技术以在IKC进程中防御恶意攻击的网络资产。对抗APT攻击最有前途的方法之一是移动目标防御(MTD)。 MTD技术可以动态地应用于网络基础结构(应用程序,主机和网络)中任何抽象级别的攻击步骤,从而中断任何动态IKC的成功执行。在对介绍的常用IKC进行介绍和讨论后,本文选择了其中之一,并将其​​用于进一步分析。此外,在提出了不同级别的MTD技术的新的全面分类法之后,在IKC模型和现有MTD技术之间进行了映射分析。最后,在案例研究(特别是IP随机化)中评估了MTD的效果。实验结果表明,MTD技术为抵御基于IKC的入侵活动提供了更好的手段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号