Skip to main content
Erschienen in: Information Systems Frontiers 5/2015

01.10.2015

Surviving advanced persistent threats in a distributed environment – Architecture and analysis

verfasst von: Ruchika Mehresh, Shambhu Upadhyaya

Erschienen in: Information Systems Frontiers | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Designing robust mission-critical systems demands bringing together fault tolerance and security. The emergence of Advanced Persistent Threats (APT) has further added to the challenge of meeting mission assurance goals. Despite the advances in mission survivability, the existing solutions remain ineffective against APTs. In this paper, we propose a novel survivability architecture against APTs in a distributed environment. It involves tamper-resistant and surreptitious detection and node-to-node verification of suspicious events. The solution aims to identify Attacker Intent, Objectives and Strategies (AIOS) and to design targeted recoveries that promote survivability. Its security strength has been theoretically analyzed, while the performance and scalability aspects are measured via simulation. Our simulations demonstrate high scalability with respect to network size and application runtime and the time overhead for long running applications can be easily kept under 1 % of original runtime by carefully adjusting the security strength.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bajikar, S. (2002). Trusted Platform Module (TPM) based security on notebook PCs. White Paper, Mobile Platforms Group, Intel Corporation. Bajikar, S. (2002). Trusted Platform Module (TPM) based security on notebook PCs. White Paper, Mobile Platforms Group, Intel Corporation.
Zurück zum Zitat Brewer, R. (2014). Advanced persistent threats: minimizing the damage. Network Security, 4, 5–9.CrossRef Brewer, R. (2014). Advanced persistent threats: minimizing the damage. Network Security, 4, 5–9.CrossRef
Zurück zum Zitat Cohen, F., Lambert, D., Preston, C., Berry, N., Stewart, C., & Thomas, E. (2001). A framework for deception. Computers and Security (IFIP-TC11), pp. 3–40. Cohen, F., Lambert, D., Preston, C., Berry, N., Stewart, C., & Thomas, E. (2001). A framework for deception. Computers and Security (IFIP-TC11), pp. 3–40.
Zurück zum Zitat Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff, T. A., & Mead, N. R. (1999). Survivability: protecting your critical systems. IEEE Internet Computing, 3, 55–63.CrossRef Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff, T. A., & Mead, N. R. (1999). Survivability: protecting your critical systems. IEEE Internet Computing, 3, 55–63.CrossRef
Zurück zum Zitat Gragido, W., & Pirc, J. (2011). Cyber Crime and Espionage: Seven Commonalities of Subversive Multi-vector Threats. Elsevier. Gragido, W., & Pirc, J. (2011). Cyber Crime and Espionage: Seven Commonalities of Subversive Multi-vector Threats. Elsevier.
Zurück zum Zitat Kamhoua, C., Kwiat, K. A., Chatterjee, M., Park, J. S., & Hurley, P. (2013). Replication and diversity for survivability in cyberspace: a game theoretic approach. In Proceedings of the 8th International Conference on Information Warfare and Security (ICIW), pp. 116. Kamhoua, C., Kwiat, K. A., Chatterjee, M., Park, J. S., & Hurley, P. (2013). Replication and diversity for survivability in cyberspace: a game theoretic approach. In Proceedings of the 8th International Conference on Information Warfare and Security (ICIW), pp. 116.
Zurück zum Zitat Kim, G. H., & Spafford, E. H. (1994). The design and implementation of tripwire: a file system integrity checker. In Proc. Second ACM Conference on Computer and Communications Security, pp. 18–29. Kim, G. H., & Spafford, E. H. (1994). The design and implementation of tripwire: a file system integrity checker. In Proc. Second ACM Conference on Computer and Communications Security, pp. 18–29.
Zurück zum Zitat Mcwhorter, D. (2013). APT1: exposing one of China’s cyber espionage units. Mandiant Corporation. Mcwhorter, D. (2013). APT1: exposing one of China’s cyber espionage units. Mandiant Corporation.
Zurück zum Zitat Mehresh, R., & Upadhyaya, S. (2012). A deception framework for survivability against next generation cyber attacks. International Conference on Security and Management (SAM). Mehresh, R., & Upadhyaya, S. (2012). A deception framework for survivability against next generation cyber attacks. International Conference on Security and Management (SAM).
Zurück zum Zitat Mehresh, R., Upadhyaya, S., & Kwiat, K. A. (2010). A multi-step simulation approach toward secure fault tolerant system evaluation. International Workshop on Dependable Network Computing and Mobile Systems (DNCMS) in conjunction with IEEE Symposium on Reliable Distributed Systems, pp. 363–367. Mehresh, R., Upadhyaya, S., & Kwiat, K. A. (2010). A multi-step simulation approach toward secure fault tolerant system evaluation. International Workshop on Dependable Network Computing and Mobile Systems (DNCMS) in conjunction with IEEE Symposium on Reliable Distributed Systems, pp. 363–367.
Zurück zum Zitat Mehresh, R., Rao, J. J., Upadhyaya, S., Natarajan, S., & Kwiat, K. A. (2011). Tamper-resistant monitoring for securing multi-core environments. International Conference on Security and Management (SAM). Mehresh, R., Rao, J. J., Upadhyaya, S., Natarajan, S., & Kwiat, K. A. (2011). Tamper-resistant monitoring for securing multi-core environments. International Conference on Security and Management (SAM).
Zurück zum Zitat Mehresh, R., Upadhyaya, S., & Kwiat, K. (2012). Secure proactive recovery - a hardware based mission assurance scheme. Journal of Network Forensics, 3(32–48), 2011. Mehresh, R., Upadhyaya, S., & Kwiat, K. (2012). Secure proactive recovery - a hardware based mission assurance scheme. Journal of Network Forensics, 3(32–48), 2011.
Zurück zum Zitat Repik, K. A. (2008). Defeating adversary network intelligence efforts with active cyber defense techniques. No. AFIT/ICW/ENG/08-11, Grad. School of Eng. and Management, Air Force Inst. of Tech. Repik, K. A. (2008). Defeating adversary network intelligence efforts with active cyber defense techniques. No. AFIT/ICW/ENG/08-11, Grad. School of Eng. and Management, Air Force Inst. of Tech.
Zurück zum Zitat Schryen, G., Volkamer, M., Ries, S., & Habib, S. M. (2011). A formal approach towards measuring trust in distributed system. In Proceedings of the ACM Symposium on Applied Computing, pp. 1739–1745. Schryen, G., Volkamer, M., Ries, S., & Habib, S. M. (2011). A formal approach towards measuring trust in distributed system. In Proceedings of the ACM Symposium on Applied Computing, pp. 1739–1745.
Zurück zum Zitat Trusted Computing Group Incorporated. (2007). TCG Software Stack (TSS) Specification version 1.2. Trusted Computing Group Incorporated. (2007). TCG Software Stack (TSS) Specification version 1.2.
Zurück zum Zitat Yuill, J., Denning, D., & Feer, F. (2006). Using deception to hide things from hackers: processes, principles, and techniques. Journal of Information Warfare, 26–40. Yuill, J., Denning, D., & Feer, F. (2006). Using deception to hide things from hackers: processes, principles, and techniques. Journal of Information Warfare, 26–40.
Metadaten
Titel
Surviving advanced persistent threats in a distributed environment – Architecture and analysis
verfasst von
Ruchika Mehresh
Shambhu Upadhyaya
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 5/2015
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-015-9569-y

Weitere Artikel der Ausgabe 5/2015

Information Systems Frontiers 5/2015 Zur Ausgabe