Gathering Threat Intelligence through Computer Network Deception

被引:0
|
作者
Urias, Vincent E. [1 ]
Stout, William M. S. [1 ]
Lin, Han W. [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM USA
关键词
network security; virtual networking; software-defined-networking; virtual machine introspection; advanced persistent threat; honeypots; honeynets; deception;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat landscape is changing significantly; complexity and rate of attacks is ever increasing, and the network defender does not have enough resources (people, technology, intelligence, context) to make informed decisions. The need for network defenders to develop and create proactive threat intelligence is on the rise. Network deception may provide analysts the ability to collect raw intelligence about threat actors as they reveal their Tools, Tactics and Procedures (TTP). This increased understanding of the latest cyber-attacks would enable cyber defenders to better support and defend the network, thereby increasing the cost to the adversary by making it more difficult to successfully attack an enterprise. Using a deception framework, we have created a live, unpredictable, and adaptable Deception Environment leveraging virtualization/cloud technology, software defined networking, introspection and analytics. The environment not only provides the means to identify and contain the threat, but also facilitates the ability to study, understand, and develop protections against sophisticated adversaries. By leveraging actionable data, in real-time or after a sustained engagement, the Deception Environment may be easily modified to interact with and change the perception of the adversary on-the-fly. This ability to change what and where the attacker is on the network, as well as change and modify the content of the adversary on exfiltration and infiltration, is the defining novelty of our Deception Environment.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Intelligence gathering for decision making
    Nutt, Paul C.
    OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 2007, 35 (05): : 604 - 622
  • [42] The denial and deception challenge to intelligence
    Rossa P.J.
    Trends in Organized Crime, 2000, 6 (1) : 106 - 110
  • [43] Network Security Threat Intelligence Prediction in Network Traffic Analysis Based on Machine Learning
    Guan Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [44] Attack scenario graphs for computer network threat analysis and prediction
    Hughes, T
    Sheyner, O
    COMPLEXITY, 2003, 9 (02) : 15 - 18
  • [45] Optimal control strategies for a computer network under virus threat
    Avci, Derya
    Soytuerk, Fatma
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2023, 419
  • [46] A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Liu, Haoyuan
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 2705 - 2708
  • [47] Research on the Main Threat and Prevention Technology of Computer Network Security
    Gao, Xiang
    Liu, Liyuan
    Zhu, Xuanbing
    2020 ASIA CONFERENCE ON GEOLOGICAL RESEARCH AND ENVIRONMENTAL TECHNOLOGY, 2021, 632
  • [48] Analyzing person-exposure patterns in lone-actor terrorism Implications for threat assessment and intelligence gathering
    Clemmow, Caitlin
    Bouhana, Noemie
    Gill, Paul
    CRIMINOLOGY & PUBLIC POLICY, 2020, 19 (02) : 451 - 482
  • [49] INTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence
    Koloveas, Paris
    Chantzios, Thanasis
    Alevizopoulou, Sofia
    Skiadopoulos, Spiros
    Tryfonopoulos, Christos
    ELECTRONICS, 2021, 10 (07)
  • [50] CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning
    Kristiansen, Linn-Mari
    Agarwal, Vinti
    Franke, Katrin
    Shah, Raj Sanjay
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2299 - 2308