PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

被引:7
|
作者
Lee, Junghee [1 ]
Choi, Jione [1 ]
Lee, Gyuho [2 ]
Shim, Shin-Woo [2 ]
Kim, Taekyu [2 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] LIG NEX1 Co Ltd, Cyber Warfare Res & Dev Lab, Seongnam 13488, South Korea
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Libraries; Virtual machining; Monitoring; Intrusion detection; Containers; Electronic mail; Deception technology; file system; honeypot; SYSTEM;
D O I
10.1109/ACCESS.2020.2973700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have mainly focused on using user data files as decoys, this concept can be applied to system files. If so, it is expected to be effective in detecting malicious users because it is very difficult to commit an attack without accessing a single system file. However, it may suffer from excessive false alarms by legitimate system services such as file indexing and searching. Legitimate users may also access fake files by mistake. This paper addresses this issue by introducing a hidden interface. Legitimate users and applications access files through the hidden interface which does not show fake files. The hidden interface can also be utilized to hide sensitive files by hiding them from the regular interface. By experiments, we demonstrate the proposed technique incurs negligible performance overhead, and it is an effective countermeasure to various attack scenarios and practical in that it does not generate false alarms for legitimate applications and users.
引用
收藏
页码:32203 / 32214
页数:12
相关论文
共 50 条
  • [31] File-Based Workflows: Key Challenges in Real-World Facilities
    De Geyter, Matthias
    Overmeire, Luk
    SMPTE MOTION IMAGING JOURNAL, 2011, 120 (02): : 37 - 42
  • [32] File-based Memory Management for Non-Volatile Main Memory
    Oikawa, Shuichi
    Miki, Satoshi
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 559 - 568
  • [33] Report from the Standards Vice President: Standards for File-Based Workflows
    1600, Society of Motion Picture and Television Engineers (126):
  • [34] Distributing file-based data to remote sites within the BABAR collaboration
    Adye, T
    Dorigo, A
    Forti, A
    Leonardi, E
    PROCEEDINGS OF CHEP 2001, 2001, : 284 - 285
  • [35] Reliability of file-based retrospective ratings of psychopathy with the PCL-R
    Grann, M
    Langstrom, N
    Tengstrom, A
    Stalenheim, EG
    JOURNAL OF PERSONALITY ASSESSMENT, 1998, 70 (03) : 416 - 426
  • [36] Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review
    Raducu, Razvan
    Rodriguez, Ricardo J.
    Alvarez, Pedro
    IEEE ACCESS, 2022, 10 : 21742 - 21758
  • [37] Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
    Maestre Vidal, Jorge
    Sotelo Monge, Marco Antonio
    SENSORS, 2020, 20 (07)
  • [38] Empowering file-based radio production tbrough media asset management systems
    Muylaert, Bjorn
    Beckers, Tom
    MULTIMEDIA SYSTEMS AND APPLICATIONS IX, 2006, 6391
  • [39] Distributed Storage Hash Algorithm (DSHA) for File-Based Deduplication in Cloud Computing
    Hema, S.
    Kangaiammal, A.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 572 - 581
  • [40] Sequential Reservoir Computing for Log File-Based Behavior Process Data Analyses
    Xiong, Jiawei
    Wang, Shiyu
    Tang, Cheng
    Liu, Qidi
    Sheng, Rufei
    Wang, Bowen
    Kuang , Huan
    Cohen, Allan S.
    Xiong , Xinhui
    JOURNAL OF EDUCATIONAL MEASUREMENT, 2024,