首页> 外文会议>IEEE Military Communications Conference >Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware
【24h】

Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware

机译:控制网络网络中数据exfiltation的风险,由于隐秘传播恶意软件

获取原文

摘要

Infamous recent cyber attacks on businesses and governments have demonstrated that even the best contemporary security systems can not prevent well-resourced adversaries from infiltrating their networks and gaining access to sensitive information. Stealthy malware can spread through a network undetected by utilizing zero-day exploits to propagate and hiding malicious behavior in normal activity, potentially doing significant damage before exploited vulnerabilities can be identified or patches developed. In this work, we consider a scenario in which an attacker deploys propagating malware enabling the exfiltration of data from infected devices, and a defender deploys detection and recovery mechanisms designed to control malware spread while obeying network-wide resource constraints. We use a stochastic model to represent changes in the state of the network and analytically derive an upper bound on the total rate at which an optimal attacker can exfiltrate data from the network, expressed in terms of several network parameters, when the detection rate is proportional to the outgoing data rate at each infected device. Our results can help inform cybersecurity decision-makers in judiciously allocating resources to manage risk.
机译:最近的企业和政府的疑难智的网络攻击已经证明,即使是最佳的当代安全系统也无法阻止资源良好的对手渗透其网络并获得对敏感信息的访问。隐身恶意软件可以通过利用零天漏气在正常活动中传播和隐藏恶意行为来展开未检出的网络,可能在被剥削漏洞之前造成重大损坏或开发的补丁。在这项工作中,我们考虑一个方案,其中攻击者部署传播恶意软件,使得从受感染的设备中的数据进行灭绝,并且防御者部署旨在控制恶意软件的检测和恢复机制,同时遵循网络范围的资源约束。我们使用随机模型来表示网络状态的变化,并分析了最佳攻击者可以从网络中抵消数据的总速率的上限,当检测速率比例时表达了几种网络参数。到每个受感染设备的传出数据速率。我们的结果可以帮助通知网络安全决策者,以便在明智地分配资源以管理风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号