Gathering Threat Intelligence through Computer Network Deception

被引:0
|
作者
Urias, Vincent E. [1 ]
Stout, William M. S. [1 ]
Lin, Han W. [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM USA
关键词
network security; virtual networking; software-defined-networking; virtual machine introspection; advanced persistent threat; honeypots; honeynets; deception;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat landscape is changing significantly; complexity and rate of attacks is ever increasing, and the network defender does not have enough resources (people, technology, intelligence, context) to make informed decisions. The need for network defenders to develop and create proactive threat intelligence is on the rise. Network deception may provide analysts the ability to collect raw intelligence about threat actors as they reveal their Tools, Tactics and Procedures (TTP). This increased understanding of the latest cyber-attacks would enable cyber defenders to better support and defend the network, thereby increasing the cost to the adversary by making it more difficult to successfully attack an enterprise. Using a deception framework, we have created a live, unpredictable, and adaptable Deception Environment leveraging virtualization/cloud technology, software defined networking, introspection and analytics. The environment not only provides the means to identify and contain the threat, but also facilitates the ability to study, understand, and develop protections against sophisticated adversaries. By leveraging actionable data, in real-time or after a sustained engagement, the Deception Environment may be easily modified to interact with and change the perception of the adversary on-the-fly. This ability to change what and where the attacker is on the network, as well as change and modify the content of the adversary on exfiltration and infiltration, is the defining novelty of our Deception Environment.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
  • [22] GATHERING THREAT INTELLIGENCE FROM MALWARE ANALYSIS PLATFORMS FOR E-BUSINESS SYSTEMS SECURITY
    Sechel, Sergiu
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2017): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2017, : 370 - 375
  • [23] CRISIS IN INTELLIGENCE GATHERING
    TAYLOR, T
    HILSMAN, R
    SCHWARZ, FAO
    WARNKE, PC
    COLUMBIA JOURNAL OF LAW AND SOCIAL PROBLEMS, 1976, 12 (04): : 451 - 487
  • [24] INTELLIGENCE GATHERING AND NRC
    CARRUTHE.J
    SCIENCE FORUM, 1974, 7 (02): : 2 - 2
  • [26] Network attack prediction method based on threat intelligence for IoT
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30257 - 30270
  • [27] Network security situational awareness model based on threat intelligence
    Zhang H.
    Yin Y.
    Zhao D.
    Liu B.
    1600, Editorial Board of Journal on Communications (42): : 182 - 194
  • [28] Research on Named Entity Recognition Method of Network Threat Intelligence
    Zhang, Keke
    Chen, Xu
    Jing, Yongjun
    Wang, Shuyang
    Tang, Lijun
    CYBER SECURITY, CNCERT 2022, 2022, 1699 : 213 - 224
  • [29] A Peer to Peer Federated Graph Neural Network for Threat Intelligence
    Bouharoun, Mouad
    Taghdouti, Bilal
    Erradi, Mohammed
    NETWORKED SYSTEMS, NETYS 2023, 2023, 14067 : 35 - 40
  • [30] Network attack prediction method based on threat intelligence for IoT
    Hongbin Zhang
    Yuzi Yi
    Junshe Wang
    Ning Cao
    Qiang Duan
    Multimedia Tools and Applications, 2019, 78 : 30257 - 30270