Surviving Advanced Persistent Threats - a Framework and Analysis

被引:0
|
作者
Mehresh, Ruchika [1 ]
Upadhyaya, Shambhu [2 ,3 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
[2] SUNY Buffalo, Comp Sci & Engn, Buffalo, NY 14260 USA
[3] SUNY Buffalo, CEISARE, Buffalo, NY 14260 USA
关键词
intrusion detection; mission-critical systems; simulation; tamper-resistant monitoring;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designing robust mission-critical systems demands bringing together fault tolerance and security. The emergence of advanced persistent threats (APT) has further added to the challenge of meeting mission assurance goals. Despite the advances in mission survivability, the existing solutions remain ineffective against APTs. In this paper, we propose a novel survivability framework against APTs in a distributed environment. It involves tamper-resistant and surreptitious detection and node-to-node verification of suspicious events. The solution aims to identify attacker intent, objectives and strategies (AIOS) and to design targeted recoveries that promote survivability. Its security strength has been theoretically analyzed, while the performance and scalability aspects are measured via simulation. Our simulations demonstrate high scalability with respect to network size and application runtime and the time overhead for long running applications can be easily kept under 1% of original runtime by carefully adjusting the security strength.
引用
收藏
页码:445 / 454
页数:10
相关论文
共 50 条
  • [31] Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage
    Abass, Ahmed A. Alabdel
    Xiao, Liang
    Mandayam, Narayan B.
    Gajic, Zoran
    IEEE ACCESS, 2017, 5 : 8482 - 8491
  • [32] Modeling social worm propagation for advanced persistent threats
    Zhou, Peng
    Gu, Xiaojing
    Nepal, Surya
    Zhou, Jianying
    COMPUTERS & SECURITY, 2021, 108
  • [33] Evidence-Based Detection of Advanced Persistent Threats
    Tecuci, Gheorghe
    Marcu, Dorin
    Meckl, Steven
    Boicu, Mihai
    COMPUTING IN SCIENCE & ENGINEERING, 2018, 20 (06) : 54 - 65
  • [34] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [35] Exploring the vulnerability in the inference phase of advanced persistent threats
    Wu, Qi
    Li, Qiang
    Guo, Dong
    Meng, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (03)
  • [36] Preventing Advanced Persistent Threats in Complex Control Networks
    Rubio, Juan E.
    Alcaraz, Cristina
    Lopez, Javier
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 402 - 418
  • [37] Concept and difficulties of advanced persistent threats (APT): Survey
    Khaleefa, Eman J.
    Abdulah, Dhahair A.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 4037 - 4052
  • [38] Advanced Persistent threats and how to monitor and deter them
    Tankard C.
    Network Security, 2011, 2011 (08) : 16 - 19
  • [39] Developing Secure Products in the Age of Advanced Persistent Threats
    Baize, Eric
    IEEE SECURITY & PRIVACY, 2012, 10 (03) : 88 - 92
  • [40] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18