Surviving Advanced Persistent Threats - a Framework and Analysis

被引:0
|
作者
Mehresh, Ruchika [1 ]
Upadhyaya, Shambhu [2 ,3 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
[2] SUNY Buffalo, Comp Sci & Engn, Buffalo, NY 14260 USA
[3] SUNY Buffalo, CEISARE, Buffalo, NY 14260 USA
关键词
intrusion detection; mission-critical systems; simulation; tamper-resistant monitoring;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designing robust mission-critical systems demands bringing together fault tolerance and security. The emergence of advanced persistent threats (APT) has further added to the challenge of meeting mission assurance goals. Despite the advances in mission survivability, the existing solutions remain ineffective against APTs. In this paper, we propose a novel survivability framework against APTs in a distributed environment. It involves tamper-resistant and surreptitious detection and node-to-node verification of suspicious events. The solution aims to identify attacker intent, objectives and strategies (AIOS) and to design targeted recoveries that promote survivability. Its security strength has been theoretically analyzed, while the performance and scalability aspects are measured via simulation. Our simulations demonstrate high scalability with respect to network size and application runtime and the time overhead for long running applications can be easily kept under 1% of original runtime by carefully adjusting the security strength.
引用
收藏
页码:445 / 454
页数:10
相关论文
共 50 条
  • [1] Surviving advanced persistent threats in a distributed environment - Architecture and analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (05) : 987 - 995
  • [2] Surviving advanced persistent threats in a distributed environment – Architecture and analysis
    Ruchika Mehresh
    Shambhu Upadhyaya
    Information Systems Frontiers, 2015, 17 : 987 - 995
  • [3] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Baksi, Rudra P.
    Upadhyaya, Shambhu J.
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 897 - 913
  • [4] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Rudra P. Baksi
    Shambhu J. Upadhyaya
    Information Systems Frontiers, 2021, 23 : 897 - 913
  • [5] A Quantitative Security Risk Analysis Framework for Modelling and Analyzing Advanced Persistent Threats
    Kumar, Rajesh
    Singh, Siddhant
    Kela, Rohan
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 29 - 46
  • [6] A Context-Based Detection Framework for Advanced Persistent Threats
    Giura, Paul
    Wang, Wei
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 69 - 74
  • [7] An Analytical Framework to Address the Data Exfiltration of Advanced Persistent Threats
    Nar, Kamil
    Sastry, S. Shankar
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 867 - 873
  • [8] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848
  • [9] On-line Shared Platform Evaluation Framework for Advanced Persistent Threats
    Sohn, Dongsik
    Lee, Taejin
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2610 - 2628
  • [10] A Network Gene-Based Framework for Detecting Advanced Persistent Threats
    Wang, Yuan
    Wang, Yongjun
    Liu, Jing
    Huang, Zhijian
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 97 - 102