skip to main content
10.1145/2799979.2800042acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Towards proactive detection of advanced persistent threat (APT) attacks using honeypots

Authors Info & Claims
Published:08 September 2015Publication History

ABSTRACT

The Advanced Persistent Threat (APT) attacks are special kind of slow moving attacks that are designed to defeat security controls using unique attack vectors and malware specifically developed for the target organization. Aim behind APT attacks is not to disrupt services but to steal valuable data and intellectual property. Therefore, timely detection of APT attack is very important. We believe that deception tools like honeypots can significantly increase the possibility of early detection of such sophisticated attacks. In this research effort, a framework is proposed in which Honeypot along with NIDS is used to actively alert the administrator and not leaving the detection of APT in the hands to administrator by correlating different network events. The proposed framework is also implemented to test effectiveness of the proposed technique.

References

  1. M. H. Almeshekah and E. H. Spafford. The case of using negative (deceiving) information in data protection. 2014.Google ScholarGoogle Scholar
  2. M. Attique. Install and configure snort hids with barnyard2, base and mysql on ubuntu. http://blog.muhammadattique.com/install-configure-snort-hids-barnyard2-base-mysql-ubuntu/.Google ScholarGoogle Scholar
  3. V. Bukac, V. Lorenc, and V. Maty. Red queens race: Apt win-win game. In Security Protocols XXII, pages 55--61. Springer, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  4. P. Chen, L. Desmet, and C. Huygens. A study on advanced persistent threats. In Communications and Multimedia Security, pages 63--72. Springer, 2014.Google ScholarGoogle Scholar
  5. E. Cole. Advanced persistent threat: understanding the danger and how to protect your organization. Newnes, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ENISA. Enisa honeypot study - proactive detection of security incidents, 2012. http://www.enisa.europa.eu/activities/cert/support/proactive-detection/proactive-detection-of-security-incidents-II-honeypots.Google ScholarGoogle Scholar
  7. D. Fronimos, E. Magkos, and V. Chrissikopoulos. Evaluating low interaction honeypots and on their use against advanced persistent threats. In Proceedings of the 18th Panhellenic Conference on Informatics, PCI '14, pages 5:1--5:2, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Grimes. Honeypots for Windows. APress, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. M. Hutchins, M. J. Cloppert, and R. M. Amin. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1: 80, 2011.Google ScholarGoogle Scholar
  10. R. JASEK, M. KOLARIK, and T. VYMOLA. Apt detection system using honeypots. In Proceedings of the 13th International Conference on Applied Informatics and Communications (AIC'13), WSEAS Press, pages 25--29, 2013.Google ScholarGoogle Scholar
  11. I. Jeun, Y. Lee, and D. Won. A practical study on advanced persistent threats. In Computer Applications for Security, Control and System Engineering, pages 144--152. Springer, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  12. krinoscybersecurity. Early detect apt via an internal honeypot network, 2014. http://www.krinoscybersecurity.com/early-detect-apts-via-an-internal-honeypot-network.Google ScholarGoogle Scholar
  13. M. Labs and M. F. P. Services. Protecting your critical assets lessons learned from operation aurora, 2010. http://www.wired.com/images-blogs/threatlevel/2010/03/operationaurora-wp-0310-fnl.pdf.Google ScholarGoogle Scholar
  14. M. Maisey. Moving to analysis-led cyber-security. Network Security, 2014(5): 5--1, 2014. http://www.sciencedirect.com/science/ARTICLE/pii/S135348581470Google ScholarGoogle ScholarCross RefCross Ref
  15. R. Mehresh. SCHEMES FOR SURVIVING ADVANCED PERSISTENT THREATS. PhD thesis, Faculty of the Graduate School of the University at Buffalo, State University of New York, 2013.Google ScholarGoogle Scholar
  16. L. Spitzner. Honeypots: Catching the insider threat. In Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pages 170--179. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Symantic. Advanced persistent threats: A symantec perspective, Nov 2011. http://www.symantec.com/content/en/us/enterprise/white-papers/b-advanced-persistent-threats-WP-21215957.en-us.pdf.Google ScholarGoogle Scholar
  18. C. Tankard. Advanced persistent threats and how to monitor and deter them. Network security, 2011(8): 16--19, 2011.Google ScholarGoogle Scholar
  19. N. Virvilis, O. Serrano, and B. Vanautgaerden. Changing the game: The art of deceiving sophisticated attackers. In Cyber Conflict (CyCon 2014), 2014 6th International Conference On, pages 87--97, June 2014.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Towards proactive detection of advanced persistent threat (APT) attacks using honeypots

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
      September 2015
      350 pages
      ISBN:9781450334532
      DOI:10.1145/2799979

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 September 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      SIN '15 Paper Acceptance Rate34of92submissions,37%Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader