首页> 外文会议>International Conference on Malicious and Unwanted Software >Measuring the effectiveness of modern security products to detect and contain emerging threats — A consensus-based approach
【24h】

Measuring the effectiveness of modern security products to detect and contain emerging threats — A consensus-based approach

机译:衡量现代安全产品检测和遏制新兴威胁的有效性—基于共识的方法

获取原文

摘要

Increasingly the idea that cyber-attacks can be stopped at the periphery of the network has become a fool's errand. In today's computing environment and cyber-threat landscape, individuals as well as corporations have recognized the fact that (i) with the emergence of cloud based computing there are no longer network boundaries under your control that can be protected, (ii) threats are often distributed in nature both in time and space — making detection extremely difficult, and (iii) the working assumption is not that you can prevent infections (the goal of 100% prevention is no longer practical) but rather, given that your "system" will be compromised, how quickly can you detect the breach and how do you minimize the impact of such an event. In this new environment, the idea that measuring the number of infected files detected within end-point devices is a good measure of the effectiveness of Anti-Malware and Security related products seems foolish. Instead, the industry has recognized that time to detect, time to countermeasure issuance, and ability to identify short-lived C&C sites are more relevant to determining the "goodness" of security products. Within this context, the authors have undertaken to develop benchmark metrics to test the ability of commercial automated gateway and endpoint security services to classify and categorize different types of web traffic (malicious content, malicious activity, non-malicious category). A test methodology has been developed for this purpose, based on the Wireless Systems Security Research Laboratory (WSSRL) test methodology, and extensions to CheckVir Battery Test. Using this methodology, eight gateway protection services were tested and classified for their ability to identify the incoming traffic as malicious, C&C communications, and non-malicious content. A key component of the methodology is the concept of eventual consensus, a methodology whereas new threats are - lassified as malicious or not when (n/2+ 1) security products agree on the nature of the threat over time. The methodology was developed as a simplified extension of the well known Byzantine Agreement protocol first discussed by Leslie Lamport.
机译:可以在网络外围停止网络攻击的想法越来越成为傻子的事。在当今的计算环境和网络威胁环境中,个人和公司已经认识到以下事实:(i)随着基于云计算的出现,不再有可以保护的网络边界受您控制,(ii)威胁常常分布在自然界中的时间和空间上-使得检测极为困难,并且(iii)可行的假设不是您可以预防感染(100%预防的目标不再可行),而是因为您的“系统”将受到损害时,您能多快地检测到违规行为,以及如何最大程度地减少此类事件的影响。在这种新环境中,测量端点设备中检测到的受感染文件的数量是衡量反恶意软件和安全性相关产品的有效性的好方法,这一想法看来是愚蠢的。取而代之的是,业界已经认识到,发现时间,采取对策发布的时间以及识别寿命短的C&C站点的能力与确定安全产品的“优劣”更为相关。在这种情况下,作者已承诺开发基准度量标准,以测试商业自动化网关和端点安全服务对不同类型的Web流量(恶意内容,恶意活动,非恶意类别)进行分类的能力。为此,基于无线系统安全研究实验室(WSSRL)测试方法以及CheckVir电池测试的扩展,开发了一种测试方法。使用此方法,对八种网关保护服务进行了测试和分类,以将其识别为恶意,C&C通信和非恶意内容的传入流量。该方法的关键组成部分是最终共识的概念,这是一种方法,而当(n / 2 + 1)个安全产品随着时间的推移对威胁的性质达成共识时,新威胁就会被分类为恶意或非恶意。该方法的开发是对Leslie Lamport最初讨论的众所周知的拜占庭协定协议的简化扩展。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号