Attack Graph Obfuscation

03/06/2019
by   Rami Puzis, et al.
0

Before executing an attack, adversaries usually explore the victim's network in an attempt to infer the network topology and identify vulnerabilities in the victim's servers and personal computers. Falsifying the information collected by the adversary post penetration may significantly slower lateral movement and increase the amount of noise generated within the victim's network. We investigate the effect of fake vulnerabilities within a real enterprise network on the attacker performance. We use the attack graphs to model the path of an attacker making its way towards a target in a given network. We use combinatorial optimization in order to find the optimal assignments of fake vulnerabilities. We demonstrate the feasibility of our deception-based defense by presenting results of experiments with a large scale real network. We show that adding fake vulnerabilities forces the adversary to invest a significant amount of effort, in terms of time and exploitability cost.

READ FULL TEXT
research
04/02/2018

Security of Transportation Networks: Modeling Attacker-Defender Interaction

Transportation networks are increasingly facing new security threats due...
research
04/02/2018

Securing Infrastructure Facilities: When does proactive defense help?

Infrastructure systems are increasingly facing new security threats due ...
research
04/03/2023

Learning About Simulated Adversaries from Human Defenders using Interactive Cyber-Defense Games

Given the increase in cybercrime, cybersecurity analysts (i.e. Defenders...
research
09/12/2018

Reversing the asymmetry in data exfiltration

Preventing data exfiltration from computer systems typically depends on ...
research
01/03/2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs

This paper investigates the problem of synthesizing proactive defense sy...
research
08/06/2020

Predicting Missing Information of Key Aspects in Vulnerability Reports

Software vulnerabilities have been continually disclosed and documented....
research
10/25/2018

Attack Graph Convolutional Networks by Adding Fake Nodes

Graph convolutional networks (GCNs) have been widely used for classifyin...

Please sign up or login with your details

Forgot password? Click here to reset