DocumentCode :
263579
Title :
Low-cost active cyber defence
Author :
Podins, Karlis ; Skujina, Iveta ; Teivans, Vans
Author_Institution :
Univ. of Latvia, Riga, Latvia
fYear :
2014
fDate :
3-6 June 2014
Firstpage :
1
Lastpage :
16
Abstract :
The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classified as minor, e.g. span or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end states-ponsored incidents and advanced persistent threats) for two reasons: (1) being the least complicated incidents, we expect to find simple active response strategies; (2) being the most common incidents, fighting them will most effectively make cyberspace more secure. We present a literature review encompassing results from academia and practitioners, and describe a previously unpublished hands-on effort to actively hinder phishing incidents. Before that, we take a look at several published definitions of active cyber defence, and identify some contradictions between them. So far we have identified active strategies for the following cyber threats: (1) Nigerian letters - keep up conversation by an artificial intelligence (Al) text analyser and generator; (2) spar - traffic generation for advertised domains; (3) phishing - upload of fake credentials and/or special monitored sandboxed accounts; (4) information collection botnets - fake data (credit card, credentials etc.) upload. The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of the proposed strategies.
Keywords :
economics; law; security of data; Nigerian letters; active response strategy; cyber attacks; cyber threat vectors; cyberspace; information collection botnets; legal aspects; low-cost active cyber defence; low-end cyber incidents; phishing; phishing incidents; security economics point-of-view; spar; Artificial intelligence; Cyberspace; Economics; Electronic mail; Employment; Security; US Department of Defense; Nigerian letters; active cyber defence; botnet; cyber crime; phishing; security economics; spam;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Conflict (CyCon 2014), 2014 6th International Conference On
Conference_Location :
Tallinn
ISSN :
2325-5366
Print_ISBN :
978-9949-9544-0-7
Type :
conf
DOI :
10.1109/CYCON.2014.6916412
Filename :
6916412
Link To Document :
بازگشت