ABSTRACT
Advanced
Persistent Threats (APTs), represent sophisticated and enduring network
intrusion campaigns targeting sensitive information from targeted organizations
and operating over a long period. These types of threats are much harder to
detect using signature-based methods. Anomaly-based methods consist of
monitoring system activity to determine whether an observed activity is normal
or abnormal. This is done according to heuristic or statistical analysis, and
can be used to detect unknown attacks. Despite all significant research
efforts, such techniques still suffer from a high number of false positive
detections. Detecting APTs is complex because it tends to follow a “low and
slow” attack profile that is very difficult to distinguish from normal,
legitimate activity. The volume of data that must be analyzed is overwhelming.
One technology that holds promise for detecting this kind of attack that is
nearly invisible is Big data analytics. In this work, I propose a data-driven
anomaly based behavior detection method which aims to leverage big data methods,
and capable of processing significant amounts of data from diverse or several
data sources. Big data analytics will significantly enhance or improve the
detection capabilities, enabling the detection of Advanced Persistent Threats
(APTs) activities that pass under the radar of traditional security solutions.
CHAPTER ONE
INTRODUCTION
1.1 Background of the
study
With
the rapid development of computer networks, new and sophisticated types of
attacks have emerged which require novel and more sophisticated defense
mechanisms. Advanced Persistent Threats (APTs) are one of the most fast-growing
cyber security threats that organizations face today [12]. They are carried out
by knowledgeable, very skilled and well-funded hackers, targeting sensitive
information from specific organizations. The objective of an APT attack is to
steal sensitive data from the targeted organization, to gain access to
sensitive customer data, or to access strategic or important business
information that could be used for financial gain, blackmail, embarrassment,
data poisoning, “illegal insider trading or disrupting an organization’s
business” [30]. APT attackers target organizations in sectors with high-value
information, such as national defense or military, manufacturing, and the financial
industry.
The
technologies and methods employed in APT attacks are stealthy and difficult to
detect, for instance, they can employ “social engineering which involves
tricking people into breaking normal security procedures” [13]. In addition,
the APT intruders constantly change and refine their methods, including having
insiders (those within the organization) who abuse legitimate access rights to
manipulate and steal data. Once
hacking into the targeted network is successful, the intruder installs APT
malware on the victim’s system. The attacker then is able to monitor and
control the spread of malware and also remotely control the infected systems.
This opens a channel through which they steal sensitive information from the
victim’s system unknowingly to the owner, over a long period of time except if
the malicious activity is detected. After the information of interest has been
found the attacker gives a command to exfiltrate the information. This is
usually done through a channel separate from the Command and Control (C&C)
channel. To maintain access to the network the attacker continuously rewrites
codes and employs sophisticated evasion methods. The frequency or the rate of
such attacks and breaches highlights the fact that even the best Information
Technology (IT) network perimeter defenses or traditional security solutions,
including proxy, firewall, VPN, antivirus, and malware tools are unable to
prevent the intrusions [Craig Richardson
(http://data-informed.com/use-data-analytics-combat-advanced-persistent-threats).The
data breach investigation report stated in Verizon [14] confirmed that, in 86%
of the cases, evidence about the data breach was recorded in the organization
logs but the traditional security solutions failed to raise security alarms.
This is a signal that there is a need for other forms of security solutions in
addition to the existing ones that would be better able to detect the
activities of APTs. Detecting APTs is complex because it tends to follow a low
and slow attack profile that is very difficult to differentiate from normal,
legitimate activity. Thus, detection of this kind of attacks relies heavily on
heuristics or human inspection. The best way to achieve this detection is by
examining communication patterns over many nodes, over an extended period,
which is better than the micro-examination of specific packets or protocol
patterns for malware which tend to generate too many false positive detections.
Though, as pointed earlier, differentiating normal legitimate activity from
malicious APTs is difficult, nevertheless, certain aspects of APT behavior can
be detected by observing trends over periods of time (days or weeks) to spot
unusual patterns.
An
approach that can connect different low-level events to each other to form an
attack scenario can possibly detect APTs attack [15] [16] and reduce false
positives. The correlation of recent and historical events of network traffic
logged data from many numbers of diverse data sources can help detect APT
malware. According to Jared Dean [31], “Anomaly detection should detect
malicious behaviors including segmentation of binary code in a user password,
stealthy reconnaissance attempts, backdoor service on a well-known standard
port, natural failures in the network, new buffer overflow attacks, HTTP
traffic on a non-standard port, intentionally stealthy attacks, variants of
existing attacks in new environments, and so on”. Accurate anomaly detection of
these malicious behaviors has several challenges due to the huge volume of data
that must be analyzed. Big Data storage and analysis techniques can be a
solution to this challenge. The advantage of big data tools is that they can
assist to handle the large volumes and semi-structured data formats involved in
monitoring large networks [32]. Big data helps to collect and analyze terabytes
of data collected from diverse sources and in addition, such correlation helps
to lower false positive alerts. It helps to increase the quantity and scope of
data over which correlation can be performed. Big data analytics significantly
enhance the detection capabilities, enabling the detection of APT activities
that are passing under the radar of traditional security solutions. This work
presents an intelligent distributed Machine Learning System that detects APT
activities based on examining communication patterns registered in Network
traffic and logs, over multiple nodes and over an extended period. The proposed
system leverages big data Machine Learning methods to identify the necessary
features to identify APT commands, Command channels and with the extracted
features, a model is created to detect malicious traffic. The Classification
method was used to create the models, and the detection accuracy of the created
model was evaluated. The evaluated results show that the models are capable of
detecting malicious attack with high accuracy and low false positive rates.
Department: Computer Science (M.Sc Thesis)
Format: MS Word
Chapters: 1 - 5, Preliminary Pages, Abstract, References, Appendix.
No. of Pages: 82
NB: The Complete Thesis is well written and ready to use.
Price: 20,000 NGN
In Stock
Our Customers are Happy!!!
No comments:
Post a Comment
Add Comment