Role-Based Deception in Enterprise Networks

08/07/2020
by   Iffat Anjum, et al.
0

Historically, enterprise network reconnaissance is an active process, often involving port scanning. However, as routers and switches become more complex, they also become more susceptible to compromise. From this vantage point, an attacker can passively identify high-value hosts such as the workstations of IT administrators, C-suite executives, and finance personnel. The goal of this paper is to develop a technique to deceive and dissuade such adversaries. We propose HoneyRoles, which uses honey connections to build metaphorical haystacks around the network traffic of client hosts belonging to high-value organizational roles. The honey connections also act as network canaries to signal network compromise, thereby dissuading the adversary from acting on information observed in network flows. We design a prototype implementation of HoneyRoles using an OpenFlow SDN controller and evaluate its security using the PRISM probabilistic model checker. Our performance evaluation shows that HoneyRoles has a small effect on network request completion time and our security analysis demonstrates that once an alert is raised, HoneyRoles can quickly identify the compromised switch with high probability. In doing so, we show that a role-based network deception is a promising approach for defending against adversaries that have compromised network devices.

READ FULL TEXT

page 2

page 4

page 6

page 7

page 8

page 9

page 14

page 15

research
11/28/2022

Implementing Software Defined Load Balancer and Firewall

Software-defined networking (SDN) is an architecture that aims to make n...
research
07/08/2019

P4-IPsec: Implementation of IPsec Gateways in P4 with SDN Control for Host-to-Site Scenarios

In this paper we propose P4-IPsec which follows the software-defined net...
research
07/18/2021

QuicSDN: Transitioning from TCP to QUIC for Southbound Communication in SDNs

Transport and security layer protocols make up the backbone of communica...
research
08/05/2021

Role-based lateral movement detection with unsupervised learning

Adversarial lateral movement via compromised accounts remains difficult ...
research
04/21/2021

Towards Causal Models for Adversary Distractions

Automated adversary emulation is becoming an indispensable tool of netwo...
research
02/21/2020

Optimizing Vulnerability-Driven Honey Traffic Using Game Theory

Enterprises are increasingly concerned about adversaries that slowly and...
research
06/28/2021

Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques

The starting point of securing a network is having a concise overview of...

Please sign up or login with your details

Forgot password? Click here to reset