Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review

04/01/2021
by   Lampis Alevizos, et al.
0

With the purpose of defending against lateral movement in todays borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum. Considering a full scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorised session of the compromised endpoint can be leveraged to perform limited, though malicious activities, ultimately rendering the endpoints the Achilles heel of ZTA. To effectively detect such attacks, distributed collaborative intrusion detection systems with attack scenario-based approach have been developed. Nonetheless, Advanced Persistent Threats (APTs) have demonstrated their ability to bypass this approach with high success ratio. As a result, adversaries can pass undetected or potentially alter the detection logging mechanisms to achieve a stealthy presence. Recently, blockchain technology has demonstrated solid use cases in the cyber security domain. Motivated by the convergence of ZTA and blockchain-based intrusion detection and prevention, in this paper, we examine how ZTA can be augmented onto endpoints. Namely, we perform a systematic review of ZTA models, real-world architectures with the focus on endpoints, and blockchain-based intrusion detection systems. We discuss the potential of blockchains immutability fortifying the detection process, and the identified open challenges as well as the possible solutions and future directions.

READ FULL TEXT

page 2

page 4

page 5

page 13

research
09/08/2021

On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection

This paper considers the use of novel technologies for mitigating attack...
research
01/06/2021

RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks

Advanced Persistent Threats (APTs) are sophisticated multi-step attacks,...
research
10/21/2021

Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

Intrusion Detection Systems (IDS) have been the industry standard for se...
research
02/18/2020

Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT

An Intrusion Detection System (IDS) aims to alert users of incoming atta...
research
02/18/2020

Cyberattack Action-Intent-Framework for Mapping Intrusion Observables

The techniques and tactics used by cyber adversaries are becoming more s...
research
02/18/2020

Framework to Describe Intentions of a Cyber Attack Action

The techniques and tactics used by cyber adversaries are becoming more s...
research
10/04/2018

Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems

Data-intensive applications exhibit increasing reliance on Database Mana...

Please sign up or login with your details

Forgot password? Click here to reset