Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

被引:32
|
作者
Paradise A. [1 ]
Shabtai A. [1 ]
Puzis R. [1 ]
Elyashar A. [1 ]
Elovici Y. [1 ]
Roshandel M. [2 ]
Peylo C. [3 ]
机构
[1] Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva
[2] Deutsche Telekom AG (T-Systems and Telekom Innovation Laboratories), Berlin
[3] Bosch Center for Artificial Intelligence, Renningen
来源
Paradise, Abigail (abigailp@post.bgu.ac.il) | 1600年 / Institute of Electrical and Electronics Engineers Inc., United States卷 / 04期
关键词
Advanced persistent threats (APTs); social network security; socialbots;
D O I
10.1109/TCSS.2017.2719705
中图分类号
学科分类号
摘要
Reconnaissance is the initial and essential phase of a successful advanced persistent threat (APT). In many cases, attackers collect information from social media, such as professional social networks. This information is used to select members that can be exploited to penetrate the organization. Detecting such reconnaissance activity is extremely hard because it is performed outside the organization premises. In this paper, we propose a framework for management of social network honeypots to aid in detection of APTs at the reconnaissance phase. We discuss the challenges that such a framework faces, describe its main components, and present a case study based on the results of a field trial conducted with the cooperation of a large European organization. In the case study, we analyze the deployment process of the social network honeypots and their maintenance in real social networks. The honeypot profiles were successfully assimilated into the organizational social network and received suspicious friend requests and mail messages that revealed basic indications of a potential forthcoming attack. In addition, we explore the behavior of employees in professional social networks, and their resilience and vulnerability toward social network infiltration. © 2014 IEEE.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [21] Detecting the Cyber Attacks on IoT-Based Network Devices Using Machine Learning Algorithms
    Calp, M. Hanefi
    Butuner, Resul
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024, 27 (05):
  • [22] An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
    Saharkhizan, Mahdis
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8852 - 8859
  • [23] A Sequential Scheme for Detecting Cyber Attacks in IoT Environment
    Soe, Yan Naung
    Feng, Yaokai
    Santosa, Paulus Insap
    Hartanto, Rudy
    Sakurai, Kouichi
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 238 - 244
  • [24] A Data Normalization Technique for Detecting Cyber Attacks on UAVs
    Basan, Elena
    Basan, Alexandr
    Nekrasov, Alexey
    Fidge, Colin
    Abramov, Evgeny
    Basyuk, Anatoly
    DRONES, 2022, 6 (09)
  • [25] Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots
    Songsong, Liu B.
    Feng, Pengbin
    Cao, Jiahao
    He, Xu
    Chin, Tommy
    Sun, Kun
    Li, Qi
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2022, 2022, 13358 : 197 - 217
  • [26] Targeted cyber attacks: how to mitigate the increasing risk
    Bunker G.
    Network Security, 2020, 2020 (01): : 17 - 19
  • [27] Federated Access to Cyber Observables for Detection of Targeted Attacks
    Atighetchi, Michael
    Griffith, John
    Emmons, Ian
    Mankins, David
    Guidorizzi, Richard
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 60 - 66
  • [28] Detecting Cyber-attacks in the Industrial Internet of Things using a Hybrid Deep Random Neural Network
    Pathak, Mrunal K.
    Bang, Arti
    Gawande, Ranjit M.
    Banait, Archana S.
    Sambare, G. B.
    Shaikh, Ashfaq Amir
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (01) : 165 - 174
  • [29] Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles
    Paradise, Abigail
    Shabtai, Asaf
    Puzis, Rami
    NETWORKS & SPATIAL ECONOMICS, 2019, 19 (03): : 731 - 761
  • [30] Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles
    Abigail Paradise
    Asaf Shabtai
    Rami Puzis
    Networks and Spatial Economics, 2019, 19 : 731 - 761