首页> 外文会议>International Conference on Cyber Security and Protection of Digital Services >Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment
【24h】

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment

机译:旨在识别APT攻击的人类行为,意图和严重程度应用欺骗技术 - 实验

获取原文

摘要

Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature- and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deployed for intrusion detection and attack analysis, providing an alternative to detect APT behaviours. This work explores the use of honey items to classify intrusion interactions, differentiating automated attacks from those which need some human reasoning and interaction towards APT detection. Multiple decoy items are deployed on honeypots in a virtual honey network, some as breadcrumbs to detect indications of a structured manual attack. Monitoring functionality was created around Elastic Stack with a Kibana dashboard created to display interactions with various honey items. APT type manual intrusions are simulated by an experienced pentesting practitioner carrying out simulated attacks. Interactions with honey items are evaluated in order to determine their suitability for discriminating between automated tools and direct human intervention. The results show that it is possible to differentiate automatic attacks from manual structured attacks; from the nature of the interactions with the honey items. The use of honey items found in the honeypot, such as in later parts of a structured attack, have been shown to be successful in classification of manual attacks, as well as towards providing an indication of severity of the attacks
机译:通过高级持久威胁(APTS)的攻击已被证明难以使用传统的签名和基于异常的入侵检测方法来检测。可以部署欺骗技术,例如诱饵物体,通常称为蜂蜜物品以用于入侵检测和攻击分析,提供替代方法来检测APT行为。这项工作探讨了蜂蜜物品的使用来分类入侵相互作用,区分自动攻击从需要一些人工推理和相互作用的自动攻击往APT检测。多个诱饵物品在虚拟蜂蜜网络中的蜜罐上部署,有些是面包屑,以检测结构化手动攻击的迹象。在弹性堆栈周围创建监控功能,带有创建的Kibana仪表板,以显示与各种蜂蜜物品的交互。 APT型手动入侵是由经验丰富的经验从业者进行模拟攻击模拟的。评估与蜂蜜物品的相互作用,以确定它们适合于识别自动化工具和直接人为干预之间的适用性。结果表明,可以从手动结构攻击中区分自动攻击;从与蜂蜜物品相互作用的性质。在蜜罐中发现的蜂蜜物品如在结构化攻击的后期部分中,已被证明是在分类手工攻击方面取得成功,以及提供攻击严重程度的指示

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号