Resource-aware Cyber Deception in Cloud-Native Environments

03/06/2023
by   Marco Zambianco, et al.
0

Cyber deception can be a valuable addition to traditional cyber defense mechanisms, especially for modern cloud-native environments with a fading security perimeter. However, pre-built decoys used in classical computer networks are not effective in detecting and mitigating malicious actors due to their inability to blend with the variety of applications in such environments. On the other hand, decoys cloning the deployed microservices of an application can offer a high-fidelity deception mechanism to intercept ongoing attacks within production environments. However, to fully benefit from this approach, it is essential to use a limited amount of decoy resources and devise a suitable cloning strategy to minimize the impact on legitimate services performance. Following this observation, we formulate a non-linear integer optimization problem that maximizes the number of attack paths intercepted by the allocated decoys within a fixed resource budget. Attack paths represent the attacker's movements within the infrastructure as a sequence of violated microservices. We also design a heuristic decoy placement algorithm to approximate the optimal solution and overcome the computational complexity of the proposed formulation. We evaluate the performance of the optimal and heuristic solutions against other schemes that use local vulnerability metrics to select which microservices to clone as decoys. Our results show that the proposed allocation strategy achieves a higher number of intercepted attack paths compared to these schemes while requiring approximately the same number of decoys.

READ FULL TEXT

page 1

page 10

page 11

research
03/10/2023

The Critical Node Game

Cloud networks are the backbone of the modern distributed internet infra...
research
04/26/2018

From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks

Modern information society depends on reliable functionality of informat...
research
03/26/2022

Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs

Due to the potentially severe consequences of coordinated cyber-physical...
research
09/25/2020

Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

Rapidly-changing cloud environments that consist of heavily interconnect...
research
12/13/2022

Impact of State and State Sponsored Actors on the Cyber Environment and the Future of Critical Infrastructure

The purpose of this research paper is to critically explore the impact o...
research
09/04/2020

Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud

Moving Target Defense (MTD) is a proactive security mechanism which chan...
research
12/13/2019

Joint Reliability-aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme

Network function virtualization (NFV) is a vital player of modern networ...

Please sign up or login with your details

Forgot password? Click here to reset