Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

被引:32
|
作者
Paradise A. [1 ]
Shabtai A. [1 ]
Puzis R. [1 ]
Elyashar A. [1 ]
Elovici Y. [1 ]
Roshandel M. [2 ]
Peylo C. [3 ]
机构
[1] Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva
[2] Deutsche Telekom AG (T-Systems and Telekom Innovation Laboratories), Berlin
[3] Bosch Center for Artificial Intelligence, Renningen
来源
Paradise, Abigail (abigailp@post.bgu.ac.il) | 1600年 / Institute of Electrical and Electronics Engineers Inc., United States卷 / 04期
关键词
Advanced persistent threats (APTs); social network security; socialbots;
D O I
10.1109/TCSS.2017.2719705
中图分类号
学科分类号
摘要
Reconnaissance is the initial and essential phase of a successful advanced persistent threat (APT). In many cases, attackers collect information from social media, such as professional social networks. This information is used to select members that can be exploited to penetrate the organization. Detecting such reconnaissance activity is extremely hard because it is performed outside the organization premises. In this paper, we propose a framework for management of social network honeypots to aid in detection of APTs at the reconnaissance phase. We discuss the challenges that such a framework faces, describe its main components, and present a case study based on the results of a field trial conducted with the cooperation of a large European organization. In the case study, we analyze the deployment process of the social network honeypots and their maintenance in real social networks. The honeypot profiles were successfully assimilated into the organizational social network and received suspicious friend requests and mail messages that revealed basic indications of a potential forthcoming attack. In addition, we explore the behavior of employees in professional social networks, and their resilience and vulnerability toward social network infiltration. © 2014 IEEE.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [1] Detecting targeted attacks using shadow honeypots
    Anagnostakis, KG
    Sidiroglou, S
    Akritidis, P
    Xinidis, K
    Markatos, E
    Keromytis, AD
    USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 129 - 144
  • [2] Survey of Snaring Cyber Attacks on IoT Devices with Honeypots and Honeynets
    Oza, Antara D.
    Kumar, Gardas Naresh
    Khorajiya, Moin
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [3] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [4] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [5] Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks
    Anirudh, M.
    Thileeban, Arul S.
    Nallathambi, Daniel Jeswin
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), 2017, : 11 - 14
  • [6] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    Cluster Computing, 2021, 24 : 1435 - 1453
  • [7] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [8] DeNNeS: deep embedded neural network expert system for detecting cyber attacks
    Samaneh Mahdavifar
    Ali A. Ghorbani
    Neural Computing and Applications, 2020, 32 : 14753 - 14780
  • [9] DeNNeS: deep embedded neural network expert system for detecting cyber attacks
    Mahdavifar, Samaneh
    Ghorbani, Ali A.
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (18): : 14753 - 14780
  • [10] Cyber Social Disruption due to Cyber Attacks
    Barbosa, Jorge
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 817 - 826