Gathering Threat Intelligence through Computer Network Deception

被引:0
|
作者
Urias, Vincent E. [1 ]
Stout, William M. S. [1 ]
Lin, Han W. [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM USA
关键词
network security; virtual networking; software-defined-networking; virtual machine introspection; advanced persistent threat; honeypots; honeynets; deception;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat landscape is changing significantly; complexity and rate of attacks is ever increasing, and the network defender does not have enough resources (people, technology, intelligence, context) to make informed decisions. The need for network defenders to develop and create proactive threat intelligence is on the rise. Network deception may provide analysts the ability to collect raw intelligence about threat actors as they reveal their Tools, Tactics and Procedures (TTP). This increased understanding of the latest cyber-attacks would enable cyber defenders to better support and defend the network, thereby increasing the cost to the adversary by making it more difficult to successfully attack an enterprise. Using a deception framework, we have created a live, unpredictable, and adaptable Deception Environment leveraging virtualization/cloud technology, software defined networking, introspection and analytics. The environment not only provides the means to identify and contain the threat, but also facilitates the ability to study, understand, and develop protections against sophisticated adversaries. By leveraging actionable data, in real-time or after a sustained engagement, the Deception Environment may be easily modified to interact with and change the perception of the adversary on-the-fly. This ability to change what and where the attacker is on the network, as well as change and modify the content of the adversary on exfiltration and infiltration, is the defining novelty of our Deception Environment.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] NetFlow: Network Monitoring and Intelligence Gathering
    Ratan, Vivek
    Li, Kin Fun
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 863 - 867
  • [2] Characterizing Intelligence Gathering and Control on an Edge Network
    Arlitt, Martin
    Carlsson, Niklas
    Gill, Phillipa
    Mahanti, Aniket
    Williamson, Carey
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2011, 11 (01)
  • [3] Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification
    Le, Ba-Dung
    Wang, Guanhua
    Nasim, Mehwish
    Babar, M. Ali
    2019 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2019, : 316 - 323
  • [4] A System for Automated Open-Source Threat Intelligence Gathering and Management
    Gao, Peng
    Liu, Xiaoyuan
    Choi, Edward
    Soman, Bhavna
    Mishra, Chinmaya
    Farris, Kate
    Song, Dawn
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2716 - 2720
  • [5] Computer Network Deception as a Moving Target Defense
    Urias, Vincent E.
    Stout, William M. S.
    Loverro, Caleb
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 101 - 106
  • [6] LAWYERS, DECEPTION, AND EVIDENCE GATHERING
    STUNTZ, WJ
    VIRGINIA LAW REVIEW, 1993, 79 (08) : 1903 - 1956
  • [7] Overlord/Bodyguard: Intelligence Failure through Adversary Deception
    Smith, Timothy
    INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2014, 27 (03) : 550 - 568
  • [8] INTELLIGENCE AND DECEPTION
    HANDEL, MI
    JOURNAL OF STRATEGIC STUDIES, 1982, 5 (01) : 122 - 154
  • [9] SMALL COMPUTER NETWORK FOR GATHERING AND PROCESSING OF ANALYTICAL DATA
    CLERC, JT
    JOST, C
    MEIER, T
    SCHWARZE.R
    CHIMIA, 1973, 27 (12) : 665 - 668
  • [10] INTELLIGENCE GATHERING
    不详
    NEW STATESMAN & SOCIETY, 1994, 7 (310): : R30 - R31