DocumentCode :
263550
Title :
Changing the game: The art of deceiving sophisticated attackers
Author :
Virvilis, Nikos ; Serrano, Oscar Serrano ; Vanautgaerden, Bart
Author_Institution :
Cyber Defence & Assured Inf. Sharing, NATO Commun. & Inf. Agency, The Hague, Netherlands
fYear :
2014
fDate :
3-6 June 2014
Firstpage :
87
Lastpage :
97
Abstract :
The number and complexity of cyber-attacks has been increasing steadily in the last years. Adversaries are targeting the communications and information systems (CIS) of government, military and industrial organizations, as well as critical infrastructures, and are willing to spend large amounts of money, time and expertise on reaching their goals. In addition, recent sophisticated insider attacks resulted in the exfiltration of highly classified information to the public. Traditional security solutions have failed repeatedly to mitigate such threats. In order to defend against such sophisticated adversaries we need to redesign our defences, developing technologies focused more on detection than prevention. In this paper, we address the attack potential of advanced persistent threats (APT) and malicious insiders, highlighting the common characteristics of these two groups. In addition, we propose the use of multiple deception techniques, which can be used to protect both the external and internal resources of an organization and significantly increase the possibility of early detection of sophisticated attackers.
Keywords :
computer network security; information filtering; information systems; advanced persistent threats; communication and information systems; critical infrastructures; cyber-attacks; external resources; government organization; highly classified information exfiltration; industrial organization; internal resources; malicious insiders; military organization; multiple deception techniques; sophisticated attacker detection; sophisticated insider attacks; Electronic mail; Monitoring; Organizations; Planning; Security; Servers; Standards organizations; Advanced persistent threat; deception; honey net; honey tokens; honeypot; insiders;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Conflict (CyCon 2014), 2014 6th International Conference On
Conference_Location :
Tallinn
ISSN :
2325-5366
Print_ISBN :
978-9949-9544-0-7
Type :
conf
DOI :
10.1109/CYCON.2014.6916397
Filename :
6916397
Link To Document :
بازگشت