Visible to the public Data Exfiltration: Methods and Detection Countermeasures

TitleData Exfiltration: Methods and Detection Countermeasures
Publication TypeConference Paper
Year of Publication2021
AuthorsKing, James, Bendiab, Gueltoum, Savage, Nick, Shiaeles, Stavros
Conference Name2021 IEEE International Conference on Cyber Security and Resilience (CSR)
Keywordscomposability, countermeasures, cyberattack, Data Exfiltration, Instruments, intrusion detection system, IP networks, Measurement, Metrics, network intrusion detection, Planning, privacy, pubcrawl, security, steganography, steganography detection, telecommunication traffic, Timing
AbstractData exfiltration is of increasing concern throughout the world. The number of incidents and capabilities of data exfiltration attacks are growing at an unprecedented rate. However, such attack vectors have not been deeply explored in the literature. This paper aims to address this gap by implementing a data exfiltration methodology, detailing some data exfiltration methods. Groups of exfiltration methods are incorporated into a program that can act as a testbed for owners of any network that stores sensitive data. The implemented methods are tested against the well-known network intrusion detection system Snort, where all of them have been successfully evaded detection by its community rule sets. Thus, in this paper, we have developed new countermeasures to prevent and detect data exfiltration attempts using these methods.
DOI10.1109/CSR51186.2021.9527962
Citation Keyking_data_2021