Gathering Threat Intelligence through Computer Network Deception

被引:0
|
作者
Urias, Vincent E. [1 ]
Stout, William M. S. [1 ]
Lin, Han W. [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM USA
关键词
network security; virtual networking; software-defined-networking; virtual machine introspection; advanced persistent threat; honeypots; honeynets; deception;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat landscape is changing significantly; complexity and rate of attacks is ever increasing, and the network defender does not have enough resources (people, technology, intelligence, context) to make informed decisions. The need for network defenders to develop and create proactive threat intelligence is on the rise. Network deception may provide analysts the ability to collect raw intelligence about threat actors as they reveal their Tools, Tactics and Procedures (TTP). This increased understanding of the latest cyber-attacks would enable cyber defenders to better support and defend the network, thereby increasing the cost to the adversary by making it more difficult to successfully attack an enterprise. Using a deception framework, we have created a live, unpredictable, and adaptable Deception Environment leveraging virtualization/cloud technology, software defined networking, introspection and analytics. The environment not only provides the means to identify and contain the threat, but also facilitates the ability to study, understand, and develop protections against sophisticated adversaries. By leveraging actionable data, in real-time or after a sustained engagement, the Deception Environment may be easily modified to interact with and change the perception of the adversary on-the-fly. This ability to change what and where the attacker is on the network, as well as change and modify the content of the adversary on exfiltration and infiltration, is the defining novelty of our Deception Environment.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Network Security Situation Awareness Framework based on Threat Intelligence
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (03): : 381 - 399
  • [32] On the Application of Artificial Intelligence in Computer Network Education
    Wang Fenglan
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM - EDUCATIONAL RESEARCH AND EDUCATIONAL TECHNOLOGY, 2019, 2019, : 18 - 23
  • [33] Improving Forensic Triage Efficiency through Cyber Threat Intelligence
    Serketzis, Nikolaos
    Katos, Vasilios
    Ilioudis, Christos
    Baltatzis, Dimitrios
    Pangalos, Georgios
    FUTURE INTERNET, 2019, 11 (07)
  • [34] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [35] ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution
    Wang, Ziyu
    Zhou, Yinghai
    Liu, Hao
    Qiu, Jing
    Fang, Binxing
    Tian, Zhihong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (12) : 9388 - 9402
  • [36] Intelligence and Deception in Operation TORCH
    Patch, John
    NAVAL WAR COLLEGE REVIEW, 2008, 61 (04) : 73 - 97
  • [37] Enhancing Honeypot Deception Capability Through Network Service Fingerprinting
    Dahbul, R. N.
    Lim, C.
    Purnama, J.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2016 : APPLIED INFORMATICS TOWARD SMART ENVIRONMENT, PEOPLE, AND SOCIETY, 2017, 801
  • [38] Is gathering competitive intelligence ethical?
    Tyson, Kirk W.M.
    CHEMTECH, 1995, 25 (10):
  • [39] MODULE CONCEPT OF INTELLIGENCE GATHERING
    METZDORFF, HA
    POLICE CHIEF, 1975, 42 (02): : 52 - 53
  • [40] Noncoercive Human Intelligence Gathering
    Dando, Coral J.
    Ormerod, Thomas C.
    JOURNAL OF EXPERIMENTAL PSYCHOLOGY-GENERAL, 2020, 149 (08) : 1435 - 1448