PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

被引:7
|
作者
Lee, Junghee [1 ]
Choi, Jione [1 ]
Lee, Gyuho [2 ]
Shim, Shin-Woo [2 ]
Kim, Taekyu [2 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] LIG NEX1 Co Ltd, Cyber Warfare Res & Dev Lab, Seongnam 13488, South Korea
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Libraries; Virtual machining; Monitoring; Intrusion detection; Containers; Electronic mail; Deception technology; file system; honeypot; SYSTEM;
D O I
10.1109/ACCESS.2020.2973700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have mainly focused on using user data files as decoys, this concept can be applied to system files. If so, it is expected to be effective in detecting malicious users because it is very difficult to commit an attack without accessing a single system file. However, it may suffer from excessive false alarms by legitimate system services such as file indexing and searching. Legitimate users may also access fake files by mistake. This paper addresses this issue by introducing a hidden interface. Legitimate users and applications access files through the hidden interface which does not show fake files. The hidden interface can also be utilized to hide sensitive files by hiding them from the regular interface. By experiments, we demonstrate the proposed technique incurs negligible performance overhead, and it is an effective countermeasure to various attack scenarios and practical in that it does not generate false alarms for legitimate applications and users.
引用
收藏
页码:32203 / 32214
页数:12
相关论文
共 50 条
  • [1] File-Based Sports Production
    Bergeron, Michael
    SMPTE MOTION IMAGING JOURNAL, 2010, 119 (04): : 56 - 63
  • [2] File-Based Workflows Update
    Footen, John
    Kovalick, Al
    SMPTE MOTION IMAGING JOURNAL, 2011, 120 (06): : 69 - 71
  • [3] File-based replica management
    Kunszt, P
    Laure, E
    Stockinger, H
    Stockinger, K
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (01): : 115 - 123
  • [4] File-based data processing on MESSENGER
    Krupiarz, CJ
    Artis, DA
    Calloway, AB
    Frangos, CM
    Heggestad, BK
    Holland, DB
    Stratton, WC
    PROCEEDINGS OF THE FIFTH IAA INTERNATIONAL CONFERENCE ON LOW-COST PLANETARY MISSIONS, 2003, 542 : 435 - 442
  • [5] File-based broadcasting system in Europe
    Akiyama, Jouji
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2009, 63 (01): : 26 - 29
  • [6] Detection of file-based race conditions
    Lhee K.-S.
    Chapin S.J.
    International Journal of Information Security, 2005, 4 (1-2) : 105 - 119
  • [7] Implementing Networked File-Based Workflows
    Smith, Clyde
    SMPTE MOTION IMAGING JOURNAL, 2009, 118 (02): : 22 - 25
  • [8] File-based data processing on MESSENGER
    Krupiarz, Christopher J.
    Artis, David A.
    Calloway, Andrew B.
    Frangos, Constantine M.
    Heggestad, Brian K.
    Holland, Douglas B.
    Stratton, William C.
    ACTA ASTRONAUTICA, 2006, 59 (8-11) : 1071 - 1078
  • [9] Digital Storage in File-Based Workflows
    Coughlin, Thomas
    SMPTE MOTION IMAGING JOURNAL, 2012, 121 (06): : 77 - 82
  • [10] Effectiveness of file-based deduplication in digital forensics
    Neuner, Sebastian
    Schmiedecker, Martin
    Weippl, Edgar
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2876 - 2885