Advertisement

Proposed Approach for Targeted Attacks Detection

  • Ibrahim Ghafir
  • Vaclav Prenosil
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 362)

Abstract

For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise Internet infrastructure. Targeted attack or advanced persistent threat (APT) attack is a new challenge and aims to accomplish a specific goal, most often espionage. APTs are presently the biggest threat to governments and organizations. This paper states research questions and propose a novel approach to intrusion detection system processes network traffic and able to detect potential APT attack. This detection of APT attack is based on the correlation between the events which we get as outputs of our detection methods. Each detection method aims to detect one technique used in one of APT attack steps.

Keywords

Cyber attacks Targeted attacks Advanced persistent threat Malware Intrusion detection system 

Notes

Acknowledgments

This work has been supported by the project “CYBER-2” funded by the Ministry of Defence of the Czech Republic under contract No. 1201 4 7110.

References

  1. 1.
    Kshetri, N.: The global cybercrime industry: economic, institutional and strategic perspectives. Springer, Berlin (2010)Google Scholar
  2. 2.
    Wood, P., Nisbet, M., Egan, G., Johnston, N., Haley, K., Krishnappa, B., Tran, T. K., Asrar, I., Cox, O., Hittel, S., et al.: Symantec Internet Security Threat Report Trends for 2011, vol. XVII (2012)Google Scholar
  3. 3.
    Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16–19 (2011)CrossRefGoogle Scholar
  4. 4.
    Kaspersky Lab ZAO. Red October diplomatic cyber attacks investigation. http://www.securelist.com/en/analysis/204792262/Red_October_Diplomatic_Cyber_Attacks_Investigation. Accessed 10-11-2014
  5. 5.
    Mandiant Intelligence Center. Apt1: Exposing one of china’s cyber espionage units. Technical report, Mandiant, Tech. Rep (2013)Google Scholar
  6. 6.
    Rakes, T. R., Deane, J. K., Rees, L. P.: It security planning under uncertainty for high-impact events. Omega 40(1), 79–88 (2012)Google Scholar
  7. 7.
    Ronald, D., Rafal R.: Tracking ghostnet: Investigating a cyber espionage network. Inf. Warf. Monitor, p. 6 (2009)Google Scholar
  8. 8.
    Liu, S.T., Chen, Y. M., Lin, S. J.: A novel search engine to uncover potential victims for apt investigations. In: Network and Parallel Computing, pp. 405–416. Springer, Berlin (2013)Google Scholar
  9. 9.
    Thonnard, O., Bilge, L., O’Gorman, G., Kiernan, S., Lee, M.: Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat. In Research in Attacks, Intrusions, and Defenses, pp. 64–85. Springer, Berlin (2012)Google Scholar
  10. 10.
    Lee, M, Lewis, D.: Clustering disparate attacks: mapping the activities of the advanced persistent threat. In: Proceedings of the 21st Virus Bulletin International Conference, pp. 122–127 (October 2011)Google Scholar
  11. 11.
    Marco Balduzzi, Vincenzo Ciangaglini, and Robert McArdle. Targeted attacks detection with spunge (2013)Google Scholar
  12. 12.
    Bencsath, B., Pek, G., Buttyan, L., Felegyhazi, M.: Duqu: Analysis, detection, and lessons learned. In ACM European Workshop on System Security (EuroSec), vol. 2012 (2012)Google Scholar
  13. 13.
    Paxson, Vern: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23), 2435–2463 (1999)CrossRefGoogle Scholar
  14. 14.
    Bro Project. The bro network security monitor. http://bro.org/. Accessed 10-11-2014
  15. 15.
    Trend Micro white paper. The custom defense against targeted attacks. http://www.trendmicro.fr/media/wp/custom-defense-against-targeted-attacks-whitepaper-en.pdf. Accessed: 10-11-2014
  16. 16.
    Blade defender. http://www.blade-defender.org/eval-lab/blade.csv. Accessed 10-11-2014
  17. 17.
    Malware domain list. http://www.malwaredomainlist.com/hostslist/hosts.txt. Accessed 10-11-2014
  18. 18.
    Malware domains. http://www.malware-domains.com/files/. Accessed 10-11-2014
  19. 19.
    Abuse.ch. Palevo domain blocklist. https://palevotracker.abuse.ch/blocklists.php?download= domainblocklist. Accessed 10-11-2014
  20. 20.
    Abuse.ch. Spyeye domain blocklist. https://spyeyetracker.abuse.ch/blocklist.php?download=domainblocklist. Accessed 10-11-2014
  21. 21.
    Abuse.ch. Zeus domain blocklist. https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist. Accessed 10-11-2014
  22. 22.
    Abuse.ch. SSL blacklist a new weapon to fight malware and botnet. http://securityaffairs.co/wordpress/26672/cyber-crime/ssl-blacklist-new-weapon-fight-malware-botnet.html. Accessed 10-11-2014
  23. 23.
    Mandiant. Mandiant apt1 report appendix f update: SSL certificate hashes. https://www.mandiant.com/blog/md5-sha1/. Accessed 10-11-2014
  24. 24.
    Malware domain list. http://www.malwaredomainlist.com/hostslist/ip.txt. Accessed 10-11-2014
  25. 25.
    Abuse.ch. Palevo C&C ip blocklist. https://palevotracker.abuse.ch/blocklists.php?download=ipblocklist. Accessed 10-11-2014
  26. 26.
    Abuse.ch. Spyeye ip blocklist. https://spyeyetracker.abuse.ch/blocklist.php?download=ipblocklist. Accessed 10-11-2014
  27. 27.
    Abuse.ch. Zeus ip blocklist. https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist. Accessed: 10-11-2014
  28. 28.
    Yadav, S., Reddy, A.K.K., Narasimha Reddy, A.L., Ranjan, S.: Detecting algorithmically generated domain flux attacks with DNS traffic analysis. IEEE/ACM Trans. Netw. 20(5), 1663–1677 (2012)CrossRefGoogle Scholar
  29. 29.
    Tor Network Status. CSV list of all current tor server ip addresses. http://torstatus.blutmagie.de/. Accessed 10-11-2014

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic

Personalised recommendations