Skip to main content

2016 | OriginalPaper | Buchkapitel

Detection of Zero Day Exploits Using Real-Time Social Media Streams

verfasst von : Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek

Erschienen in: Advances in Nature and Biologically Inspired Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Detection of zero day exploits is a challenging problem. Vulnerabilities that are known only by attackers but not by software vendors and neither by users have severe impact on security of systems and networks. Such vulnerabilities are exploited to intrude systems and often cause leakage of confidential data. Due to the hitherto unknown pattern of the exploitation, real-time detection is hardly possible. Hence, often an incident is detected only long time after it took place, if it is detected at all. More timely detection of attacks is necessary to trigger suitable counter-measures like reconfiguration of firewalls and sending alerts to administrators of other vulnerable targets. Therefore, to know the attributes of a novel attack’s target system supports the protection of other vulnerable systems. We suggest a novel approach of post-incident intrusion detection system, to be precise—a crowd-based intrusion detection system. To accomplish this, we take advantage of social media users’ postings about incidents that affect their user accounts of attacked target systems or their observations about misbehaving online services. Combining knowledge of the attacked systems and reported incidents, we should be able to recognize patterns that define the attributes of vulnerable systems. Furthermore, by matching detected attribute sets with those attributes of well-known attacks, we should be able to link attacks to already existing entries in the Common Vulnerabilities and Exposures database. If a link to an existing entry is not found, we can assume to have detected an exploitation of an unknown vulnerability, i.e., a zero day exploit or the result of an advanced persistent threat. This finding could also be used to direct efforts of examining vulnerabilities of attacked systems and simultaneously lead to faster patch deployment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Aoyama, T., Naruoka, H., Koshijima, I., Machii, W., Seki, K.: Control Conference (ASCC), 2015 10th Asian, pp. 1–4. IEEE (2015) Aoyama, T., Naruoka, H., Koshijima, I., Machii, W., Seki, K.: Control Conference (ASCC), 2015 10th Asian, pp. 1–4. IEEE (2015)
3.
Zurück zum Zitat Yang, C.C., Tseng, S.S., Lee, T.J., Weng, J.F., Chen, K.: Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, ICALT 2012, pp. 121–123 (2012). doi: 10.1109/ICALT.2012.174 Yang, C.C., Tseng, S.S., Lee, T.J., Weng, J.F., Chen, K.: Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, ICALT 2012, pp. 121–123 (2012). doi: 10.​1109/​ICALT.​2012.​174
4.
Zurück zum Zitat Seeber, S., Rodosek, G.D.: 10th International Conference on Network and Service Management (CNSM), 2014, pp. 376–381. IEEE (2014) Seeber, S., Rodosek, G.D.: 10th International Conference on Network and Service Management (CNSM), 2014, pp. 376–381. IEEE (2014)
7.
Zurück zum Zitat Wang, X., Wei, F., Liu, X., Zhou, M., Zhang, M.: pp. 1031–1040 (2011) Wang, X., Wei, F., Liu, X., Zhou, M., Zhang, M.: pp. 1031–1040 (2011)
8.
Zurück zum Zitat Narr, S., Hulfenhaus, M., Albayrak, S.: Proceedings of KDML-2012, the 2012 Workshop on Knowledge Discovery, Data Mining and Machine Learning (2012) Narr, S., Hulfenhaus, M., Albayrak, S.: Proceedings of KDML-2012, the 2012 Workshop on Knowledge Discovery, Data Mining and Machine Learning (2012)
11.
Zurück zum Zitat Ritter, A., Wright, E., Casey, W., Mitchell, T.: Proceedings of the 24th International Conference on World Wide Web, pp. 896–905. International World Wide Web Conferences Steering Committee (2015) Ritter, A., Wright, E., Casey, W., Mitchell, T.: Proceedings of the 24th International Conference on World Wide Web, pp. 896–905. International World Wide Web Conferences Steering Committee (2015)
14.
Zurück zum Zitat Sampson, J., Morstatter, F., Maciejewski, R., Liu, H.: Proceedings of the 26th ACM Conference on Hypertext and Social Media, pp. 237–245. ACM (2015) Sampson, J., Morstatter, F., Maciejewski, R., Liu, H.: Proceedings of the 26th ACM Conference on Hypertext and Social Media, pp. 237–245. ACM (2015)
15.
Zurück zum Zitat Bontcheva, K., Derczynski, L., Funk, A., Greenwood, M.A., Maynard, D., Aswani, N.: RANLP, pp. 83 (September 2013) Bontcheva, K., Derczynski, L., Funk, A., Greenwood, M.A., Maynard, D., Aswani, N.: RANLP, pp. 83 (September 2013)
Metadaten
Titel
Detection of Zero Day Exploits Using Real-Time Social Media Streams
verfasst von
Dennis Kergl
Robert Roedler
Gabi Dreo Rodosek
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-27400-3_36

Premium Partner