Flow Based Analysis of Advanced Persistent Threats Detecting Targeted Attacks in Cloud Computing

被引:0
|
作者
Vance, Andrew [1 ]
机构
[1] Univ Maryland Univ Coll, Dept Cybersecur & Informat Assurance, Washington, DC USA
关键词
Advanced Persistent Threats; Cloud Computing; Cyber Security; Flow Based Analysis; Threat Detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides industry, government, and academic users' convenient and cost-effective access to distributed services and shared data via the Internet. Due to its distribution of diverse users and aggregation of immense data, cloud computing has increasingly been the focus of targeted attacks. Meta-analysis of industry studies and retrospective research involving cloud service providers reveal that cloud computing is demonstrably vulnerable to a particular type of targeted attack, Advanced Persistent Threats (APTs). APTs have proven to be difficult to detect and defend against in cloud based infocommunication systems. The prevalent use of polymorphic malware and en-crypted covert communication channels make it difficult for existing packet inspecting and signature based security technologies such as; firewalls, intrusion detection sensors, and anti-virus systems to detect APTs. In this paper, we examine the application of an alternative security approach which applies an algorithm derived from flow based monitoring to successfully detect APTs. Results indicate that statistical modeling of APT communications can successfully develop deterministic characteristics for detection is a more effective and efficient way to protect against APTs.
引用
收藏
页码:173 / 176
页数:4
相关论文
共 50 条
  • [1] Expert knowledge and data analysis for detecting advanced persistent threats
    Ramon Moya, Juan
    DeCastro-Garcia, Noemi
    Fernandez-Diaz, Ramon-Angel
    Lorenzana Tamargo, Jorge
    [J]. OPEN MATHEMATICS, 2017, 15 : 1108 - 1122
  • [2] A novel approach for detecting advanced persistent threats
    Al-Saraireh, Jaafer
    Masarweh, Ala'
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) : 45 - 55
  • [4] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [5] Targeted Cyberattacks: A Superset of Advanced Persistent Threats
    Sood, Aditya K.
    Enbody, Richard J.
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (01) : 54 - 61
  • [6] FORENSIC ANALYSIS OF ADVANCED PERSISTENT THREAT ATTACKS IN CLOUD ENVIRONMENTS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    [J]. ADVANCES IN DIGITAL FORENSICS XVI, 2020, 589 : 161 - 180
  • [7] Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine
    Tan, Jiayu
    Wang, Jian
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 153 - 165
  • [8] A Network Gene-Based Framework for Detecting Advanced Persistent Threats
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 97 - 102
  • [9] Detecting DDoS Attacks in Cloud Computing Environment
    Lonea, A. M.
    Popescu, D. E.
    Tianfield, H.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (01) : 70 - 78
  • [10] Detecting Attacks Smartly in Vehicle Cloud Computing
    Zhang, Wei
    Zhou, Siwang
    Srinivasan, Avinash
    Wu, Jie
    Lin, Yaping
    [J]. 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 245 - 252