• DocumentCode
    237356
  • Title

    A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks

  • Author

    Hasegawa, Hiroshi ; Yamaguchi, Yoshio ; Shimada, Hiroki ; Takakura, Hiroki

  • Author_Institution
    Inf. Technol. Center, Nagoya Univ., Nagoya, Japan
  • fYear
    2014
  • fDate
    21-25 July 2014
  • Firstpage
    400
  • Lastpage
    405
  • Abstract
    Recently, the sophistication of targeted cyber attacks makes conventional countermeasures useless to defend our network. Proper network design, i.e., Moderate segmentation and adequate access control, is one of the most effective countermeasures to prevent stealth activities of the attacks inside the network. By paying attention to the violation of the control, we can be aware of the existence of the attacks. In case that suspicious activities are found, we should adopt more strict design for further analysis and mitigation of damage. However, an organization must assume that its network administrators have full knowledge of its business and enough information of its network structure for selecting the most suitable design. This paper discusses a recommendation system to enhance the ability of a semi-automatic network design system previously proposed by us. Our new system evaluates on the viewpoint of two criteria, the effectiveness against malicious activities and the impact on business. The former takes the infection probability and hazardousness of communication into account and the latter considers the impact of the countermeasure which affects the organization´s activities. By reviewing the candidate of the countermeasures with these criteria, the most suitable one to the organization can be selected.
  • Keywords
    authorisation; probability; recommender systems; access control; countermeasure recommendation system; cyber attacks; hazardousness; infection probability; internal networks; network administrators; network design; targeted attacks; Access control; Malware; Organizations; Personnel; Servers; VLAN; access control; design evaluation; targeted attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual
  • Conference_Location
    Vasteras
  • Type

    conf

  • DOI
    10.1109/COMPSAC.2014.63
  • Filename
    6899242