A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Title | A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Pham, L. H., Albanese, M., Chadha, R., Chiang, C.-Y. J., Venkatesan, S., Kamhoua, C., Leslie, N. |
Date Published | June 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4760-4 |
Keywords | advanced adversaries, Adversary Models, Computer crime, computer network security, Computer worms, critical capability, cyber deception, deception-based defenses, defensive capabilities, Electronic mail, foothold, Human Behavior, Knowledge engineering, Metrics, military computing, model reconnaissance, Network reconnaissance, network reconnaissance capabilities, Organizations, passive reconnaissance techniques, persistent cyber adversaries, pubcrawl, quantitative framework, Reconnaissance, resilience, Resiliency, Scalability, stealthy attackers, Tools |
Abstract | In recent years, persistent cyber adversaries have developed increasingly sophisticated techniques to evade detection. Once adversaries have established a foothold within the target network, using seemingly-limited passive reconnaissance techniques, they can develop significant network reconnaissance capabilities. Cyber deception has been recognized as a critical capability to defend against such adversaries, but, without an accurate model of the adversary's reconnaissance behavior, current approaches are ineffective against advanced adversaries. To address this gap, we propose a novel model to capture how advanced, stealthy adversaries acquire knowledge about the target network and establish and expand their foothold within the system. This model quantifies the cost and reward, from the adversary's perspective, of compromising and maintaining control over target nodes. We evaluate our model through simulations in the CyberVAN testbed, and indicate how it can guide the development and deployment of future defensive capabilities, including high-interaction honeypots, so as to influence the behavior of adversaries and steer them away from critical resources. |
URL | https://ieeexplore.ieee.org/document/9162298 |
DOI | 10.1109/CNS48642.2020.9162298 |
Citation Key | pham_quantitative_2020 |
- Metrics
- tools
- stealthy attackers
- Scalability
- Resiliency
- resilience
- Reconnaissance
- quantitative framework
- pubcrawl
- persistent cyber adversaries
- passive reconnaissance techniques
- Organizations
- network reconnaissance capabilities
- model reconnaissance
- military computing
- Network reconnaissance
- Knowledge engineering
- Human behavior
- foothold
- Electronic mail
- defensive capabilities
- deception-based defenses
- cyber deception
- critical capability
- Computer worms
- computer network security
- Computer crime
- Adversary Models
- advanced adversaries