论文标题

识别应用欺骗技术的人类行为,意图和严重性 - 实验

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment

论文作者

Chacon, Joel, McKeown, Sean, Macfarlane, Richard

论文摘要

先进的持续威胁(APT)攻击已被证明很难使用基于传统的签名和基于异常的入侵检测方法来检测。欺骗技术,例如诱饵物体(通常称为蜂蜜项目)可以部署以进行入侵检测和攻击分析,提供了检测合适行为的替代方法。这项工作探讨了使用蜂蜜项目来对入侵相互作用进行分类,将自动攻击与需要人类推理和相互作用的自动攻击区分开来。多个诱饵项目被部署在虚拟蜂蜜网络中的蜜罐上,有些是面包屑,以检测结构化手动攻击的指示。监视功能是在弹性堆栈周围创建的,其中创建了Kibana仪表板,以显示与各种蜂蜜项目的交互。 APT类型的手动入侵是由经验丰富的五旬节从业人员进行模拟攻击模拟的。评估与蜂蜜项目的相互作用,以确定其适合区分自动工具和直接人类干预的适用性。结果表明,可以将自动攻击与手动结构化攻击区分开。从与蜂蜜物品的互动的性质。在蜜罐中发现的蜂蜜物品的使用,例如结构化攻击的后期部分,已被证明是在手动攻击的分类中成功的,并提供了攻击严重性的指示

Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature- and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deployed for intrusion detection and attack analysis, providing an alternative to detect APT behaviours. This work explores the use of honey items to classify intrusion interactions, differentiating automated attacks from those which need some human reasoning and interaction towards APT detection. Multiple decoy items are deployed on honeypots in a virtual honey network, some as breadcrumbs to detect indications of a structured manual attack. Monitoring functionality was created around Elastic Stack with a Kibana dashboard created to display interactions with various honey items. APT type manual intrusions are simulated by an experienced pentesting practitioner carrying out simulated attacks. Interactions with honey items are evaluated in order to determine their suitability for discriminating between automated tools and direct human intervention. The results show that it is possible to differentiate automatic attacks from manual structured attacks; from the nature of the interactions with the honey items. The use of honey items found in the honeypot, such as in later parts of a structured attack, have been shown to be successful in classification of manual attacks, as well as towards providing an indication of severity of the attacks

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源