An Analytical Framework to Address the Data Exfiltration of Advanced Persistent Threats

被引:0
|
作者
Nar, Kamil [1 ]
Sastry, S. Shankar [1 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting and preventing the data exfiltration of advanced persistent threats is a challenging problem. These attacks can remain in their target system for several years while retrieving information at a very slow rate, possibly after reformatting and encrypting the data they have accessed. Tainting and tracking some of the files in the system and deploying honeypots are two of the potentially effective measures against advanced persistent threats. In this paper, we introduce an analytical framework to study the effect of these measures on the amount of files that an attacker can exfiltrate. In particular, we obtain upper bounds on the expected amount of files at risk given a certain ratio of tainted and honey files in the system by using dynamic programming and Pontryagin's maximum principle. In addition, we show that in some cases tainting more of the files does not necessarily improve the security of the system. The results highlight the effectiveness and the necessity of deception for combatting advanced persistent threats.
引用
收藏
页码:867 / 873
页数:7
相关论文
共 50 条
  • [1] Surviving Advanced Persistent Threats - a Framework and Analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 445 - 454
  • [2] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Baksi, Rudra P.
    Upadhyaya, Shambhu J.
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 897 - 913
  • [3] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Rudra P. Baksi
    Shambhu J. Upadhyaya
    [J]. Information Systems Frontiers, 2021, 23 : 897 - 913
  • [4] A Context-Based Detection Framework for Advanced Persistent Threats
    Giura, Paul
    Wang, Wei
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 69 - 74
  • [5] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848
  • [6] On-line Shared Platform Evaluation Framework for Advanced Persistent Threats
    Sohn, Dongsik
    Lee, Taejin
    Kwak, Jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2610 - 2628
  • [7] A Network Gene-Based Framework for Detecting Advanced Persistent Threats
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 97 - 102
  • [8] Expert knowledge and data analysis for detecting advanced persistent threats
    Ramon Moya, Juan
    DeCastro-Garcia, Noemi
    Fernandez-Diaz, Ramon-Angel
    Lorenzana Tamargo, Jorge
    [J]. OPEN MATHEMATICS, 2017, 15 : 1108 - 1122
  • [9] A Study on Advanced Persistent Threats
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 63 - 72
  • [10] Ctracer: Uncover C&C in Advanced Persistent Threats based on Scalable Framework for Enterprise Log Data
    Hong, Kai-Fong
    Chen, Chien-Chih
    Chiu, Yu-Ting
    Chou, Kuo-Sen
    [J]. 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 551 - 558