Active defense is a popular defense technique based on systems that hinder an attacker's progress by design, rather than reactively responding to an attack only after its detection. Well-known active defense systems are honeypots. Honeypots are fake systems, designed to look like real production systems, aimed at trapping an attacker, and analyzing his attack strategy and goals. These types of systems suffer from a major weakness: it is extremely hard to design them in such a way that an attacker cannot distinguish them from a real production system. In this paper, we advocate that, instead of adding additional fake systems in the corporate network, the production systems themselves should be instrumented to provide active defense capabilities. This perspective to active defense allows containing costs and complexity, while at the same time provides the attacker with a more realistic-looking target, and gives the Incident Response Team more time to identify the attacker. The proposed proof-of-concept prototype system can be used to implement active defense in any corporate production network, with little upfront work, and little maintenance.

AHEAD: A new architecture for active defense / DE GASPARI, Fabio; Jajodia, Sushil; Mancini, Luigi Vincenzo; Panico, Agostino. - ELETTRONICO. - (2016), pp. 11-16. (Intervento presentato al convegno 9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016 tenutosi a Vienna; Austria) [10.1145/2994475.2994481].

AHEAD: A new architecture for active defense

DE GASPARI, FABIO;MANCINI, Luigi Vincenzo;PANICO, AGOSTINO
2016

Abstract

Active defense is a popular defense technique based on systems that hinder an attacker's progress by design, rather than reactively responding to an attack only after its detection. Well-known active defense systems are honeypots. Honeypots are fake systems, designed to look like real production systems, aimed at trapping an attacker, and analyzing his attack strategy and goals. These types of systems suffer from a major weakness: it is extremely hard to design them in such a way that an attacker cannot distinguish them from a real production system. In this paper, we advocate that, instead of adding additional fake systems in the corporate network, the production systems themselves should be instrumented to provide active defense capabilities. This perspective to active defense allows containing costs and complexity, while at the same time provides the attacker with a more realistic-looking target, and gives the Incident Response Team more time to identify the attacker. The proposed proof-of-concept prototype system can be used to implement active defense in any corporate production network, with little upfront work, and little maintenance.
2016
9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016
Active defense; Cyber deception; Honeypot; Honeytoken; Intrusion detection system; Computer Science Applications1707 Computer Vision and Pattern Recognition; Artificial Intelligence; Computational Theory and Mathematics
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
AHEAD: A new architecture for active defense / DE GASPARI, Fabio; Jajodia, Sushil; Mancini, Luigi Vincenzo; Panico, Agostino. - ELETTRONICO. - (2016), pp. 11-16. (Intervento presentato al convegno 9th ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2016 tenutosi a Vienna; Austria) [10.1145/2994475.2994481].
File allegati a questo prodotto
File Dimensione Formato  
DeGaspari_AHEAD_2016.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 460.2 kB
Formato Adobe PDF
460.2 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/932910
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 29
  • ???jsp.display-item.citation.isi??? 13
social impact