DocumentCode :
2382767
Title :
Catching the Wily Hacker: A multilayer deception system
Author :
Wei Wang ; Bickford, Justin ; Murynets, Ilona ; Subbaraman, R. ; Forte, A.G. ; Singaraju, G.
Author_Institution :
AT&T Security Res. Center, New York, NY, USA
fYear :
2012
fDate :
21-22 May 2012
Firstpage :
1
Lastpage :
6
Abstract :
In recent years, enterprises have been facing a growing number of highly customized attacks using sophisticated techniques that seek to compromise important company assets. In this paper, we propose a multi-layer deception system that provides an in depth defense against such sophisticated attacks. Specifically, based on previous knowledge and patterns of such attacks, we model the attacker as trying to compromising an enterprise network via multiple stages of penetration and propose defenses at each of these layers using deception based detection. We present a proof of concept implementation of one of the key deception methods proposed. Due to various financial constraints of an enterprise, we model the design of the deception system as an optimization problem in order to minimize the expected losses due to system deployment and asset compromise.
Keywords :
asset management; computer crime; computer network security; financial management; minimisation; company asset compromise; company assets; customized attacks; deception based detection; enterprise network; expected loss minimization; financial constraints; hacker; multilayer deception system; optimization problem; sophisticated attacks; sophisticated techniques; system deployment; Companies; Databases; Electronic mail; Malware; Nonhomogeneous media; Optimization; Servers; deception; honeynet; honeypot; optimization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sarnoff Symposium (SARNOFF), 2012 35th IEEE
Conference_Location :
Newark, NJ
Print_ISBN :
978-1-4673-1465-7
Type :
conf
DOI :
10.1109/SARNOF.2012.6222760
Filename :
6222760
Link To Document :
بازگشت