Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

被引:32
|
作者
Paradise A. [1 ]
Shabtai A. [1 ]
Puzis R. [1 ]
Elyashar A. [1 ]
Elovici Y. [1 ]
Roshandel M. [2 ]
Peylo C. [3 ]
机构
[1] Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva
[2] Deutsche Telekom AG (T-Systems and Telekom Innovation Laboratories), Berlin
[3] Bosch Center for Artificial Intelligence, Renningen
来源
Paradise, Abigail (abigailp@post.bgu.ac.il) | 1600年 / Institute of Electrical and Electronics Engineers Inc., United States卷 / 04期
关键词
Advanced persistent threats (APTs); social network security; socialbots;
D O I
10.1109/TCSS.2017.2719705
中图分类号
学科分类号
摘要
Reconnaissance is the initial and essential phase of a successful advanced persistent threat (APT). In many cases, attackers collect information from social media, such as professional social networks. This information is used to select members that can be exploited to penetrate the organization. Detecting such reconnaissance activity is extremely hard because it is performed outside the organization premises. In this paper, we propose a framework for management of social network honeypots to aid in detection of APTs at the reconnaissance phase. We discuss the challenges that such a framework faces, describe its main components, and present a case study based on the results of a field trial conducted with the cooperation of a large European organization. In the case study, we analyze the deployment process of the social network honeypots and their maintenance in real social networks. The honeypot profiles were successfully assimilated into the organizational social network and received suspicious friend requests and mail messages that revealed basic indications of a potential forthcoming attack. In addition, we explore the behavior of employees in professional social networks, and their resilience and vulnerability toward social network infiltration. © 2014 IEEE.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [31] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [32] An attack-norm separation approach for detecting cyber attacks
    Ye, Nong
    Farley, Toni
    Lakshminarasimhan, Deepak
    INFORMATION SYSTEMS FRONTIERS, 2006, 8 (03) : 163 - 177
  • [33] Graph-Based Spectral Analysis for Detecting Cyber Attacks
    Jaber, Majed
    Boutry, Nicolas
    Parrend, Pierre
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [34] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,
  • [35] Uncovering Periodic Network Signals of Cyber Attacks
    Ngoc Anh Huynh
    Ng, Wee Keong
    Ulmer, Alex
    Kohlhammer, Joern
    2016 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2016,
  • [36] Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions
    Wu, Mingtao
    Moon, Young B.
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2020, 20 (01)
  • [37] Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding
    Komiya, Ryousuke
    Feng, Yaokai
    Sakurai, Kouichi
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 417 - 423
  • [38] Detecting covert channel attacks on cyber-physical systems
    Li, Hongwei
    Chasaki, Danai
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2024, 9 (03) : 228 - 237
  • [39] A rule-based approach for detecting heartbleed cyber attacks
    Amodei, A.
    Capriglione, D.
    Ferrigno, L.
    Miele, G.
    Tomasso, G.
    Cerro, G.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENTS & NETWORKING (M&N 2022), 2022,
  • [40] A Tutorial on Detecting Security Attacks on Cyber-Physical Systems
    Griffioen, Paul
    Weerakkody, Sean
    Ozel, Omur
    Mo, Yilin
    Sinopoli, Bruno
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 979 - 984