Cognitive Honeypots against Lateral Movement for Mitigation of Long-Term Vulnerability

07/28/2020
by   Linan Huang, et al.
0

Lateral movement of advanced persistent threats (APTs) has posed a severe security challenge. Static segregation at separate times and spatial locations is not sufficient to protect valuable assets from stealthy and persistent attackers. Defenders need to consider time and stages holistically to discover the latent attack path across a large time-scale and achieve long-term security for the target assets. In this work, we propose a random time-expanded network to model the stochastic service requests in the enterprise network and the persistent lateral movement over stages. We design cognitive honeypots at idle production nodes to detect and deter the adversarial lateral movement and protect the target node proactively and persistently. To increase the honeypots' stealthiness, the location of the honeypot changes randomly at different times and stages. Based on the probability of service links and the likelihood of successful compromises, the defender can design the optimal honeypot policy that minimizes the long-term cyber risks of the target assets and the probability of interference and roaming cost. We propose an iterative algorithm and approximate the vulnerability with the union bound for computationally efficient deployment of honeypots. The vulnerability analysis results under the optimal and heuristic honeypot policies demonstrate that the proposed cognitive honeypot can effectively protect the target node from the lateral movement attack.

READ FULL TEXT
research
12/16/2021

APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts

Advanced Persistent Threat (APT) attack usually refers to the form of lo...
research
01/06/2020

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

Advanced Persistent Threats (APTs) are difficult to detect due to their ...
research
02/12/2019

Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment

Edge computing is providing higher class intelligent service and computi...
research
10/24/2018

The Langevin diffusion as a continuous-time model of animal movement and habitat selection

1. The utilisation distribution describes the relative probability of us...
research
04/06/2023

TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph

APT detection is difficult to detect due to the long-term latency, cover...
research
01/22/2022

Long-term Data Sharing under Exclusivity Attacks

The quality of learning generally improves with the scale and diversity ...
research
05/02/2022

S0-No-More: A Z-Wave NonceGet Denial of Service Attack utilizing included but offline NodeIDs

In this paper a vulnerability in the Z-Wave protocol specification, espe...

Please sign up or login with your details

Forgot password? Click here to reset