Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

被引:32
|
作者
Paradise A. [1 ]
Shabtai A. [1 ]
Puzis R. [1 ]
Elyashar A. [1 ]
Elovici Y. [1 ]
Roshandel M. [2 ]
Peylo C. [3 ]
机构
[1] Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva
[2] Deutsche Telekom AG (T-Systems and Telekom Innovation Laboratories), Berlin
[3] Bosch Center for Artificial Intelligence, Renningen
来源
Paradise, Abigail (abigailp@post.bgu.ac.il) | 1600年 / Institute of Electrical and Electronics Engineers Inc., United States卷 / 04期
关键词
Advanced persistent threats (APTs); social network security; socialbots;
D O I
10.1109/TCSS.2017.2719705
中图分类号
学科分类号
摘要
Reconnaissance is the initial and essential phase of a successful advanced persistent threat (APT). In many cases, attackers collect information from social media, such as professional social networks. This information is used to select members that can be exploited to penetrate the organization. Detecting such reconnaissance activity is extremely hard because it is performed outside the organization premises. In this paper, we propose a framework for management of social network honeypots to aid in detection of APTs at the reconnaissance phase. We discuss the challenges that such a framework faces, describe its main components, and present a case study based on the results of a field trial conducted with the cooperation of a large European organization. In the case study, we analyze the deployment process of the social network honeypots and their maintenance in real social networks. The honeypot profiles were successfully assimilated into the organizational social network and received suspicious friend requests and mail messages that revealed basic indications of a potential forthcoming attack. In addition, we explore the behavior of employees in professional social networks, and their resilience and vulnerability toward social network infiltration. © 2014 IEEE.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [41] Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
    Ghafouri, Amin
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 3769 - 3775
  • [42] A Network of Internet Probes for Fighting Cyber Attacks
    Rigo, Erno
    Heder, Mihaly
    ERCIM NEWS, 2016, (106): : 49 - +
  • [43] Simulating and Analysis of Cyber Attacks on a BPLC Network
    Hesar, Amin Danandeh
    Attari, Mahmoud Ahmadian
    2014 SMART GRID CONFERENCE (SGC), 2014,
  • [44] From Design to Invariants: Detecting Attacks on Cyber Physical Systems
    Adepu, Sridhar
    Mathur, Aditya
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 533 - 540
  • [45] Detecting cyber attacks with packet loss resilience for power systems
    Cavitt, Jonathan
    Wallace, Scott
    Zhao, Xinghui
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2022, 34
  • [46] A statistical method for detecting cyber/physical attacks on SCADA systems
    Van Long Do
    Fillatre, Lionel
    Nikiforov, Igor
    2014 IEEE CONFERENCE ON CONTROL APPLICATIONS (CCA), 2014, : 364 - 369
  • [47] An attack-norm separation approach for detecting cyber attacks
    Nong Ye
    Toni Farley
    Deepak Lakshminarasimhan
    Information Systems Frontiers, 2006, 8 : 163 - 177
  • [48] Cyber Security Attacks on Network with Transition Mechanisms
    Narayan, Shaneel
    Gupta, Ruchinav
    Kumar, Avinesh
    Ishrar, Salman
    Khan, Ziafil
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 163 - 169
  • [49] Deep Neural Network for Detection of Cyber Attacks
    Komar, Myroslav
    Dorosh, Vitaliy
    Hladiy, Grygoriy
    Sachenko, Anatoliy
    2018 IEEE FIRST INTERNATIONAL CONFERENCE ON SYSTEM ANALYSIS & INTELLIGENT COMPUTING (SAIC), 2018, : 186 - 189
  • [50] Network Inspection for Detecting Strategic Attacks
    Dahan, Mathieu
    Sela, Lina
    Amin, Saurabh
    OPERATIONS RESEARCH, 2022, 70 (02) : 1008 - 1024