Decepticon: A hidden markov model approach to counter advanced persistent threats

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Deception has been proposed in the literature as an effective defense mechanism to address Advanced Persistent Threats (APT). However, administering deception in a cost-effective manner requires a good understanding of the attack landscape. The attacks mounted by APT groups are highly diverse and sophisticated in nature and can render traditional signature based intrusion detection systems useless. This necessitates the development of behavior oriented defense mechanisms. In this paper, we develop Decepticon (Deception-based countermeasure) a Hidden Markov Model based framework where the indicators of compromise (IoC) are used as the observable features to aid in detection. This framework would help in selecting an appropriate deception script when faced with APTs or other similar malware and trigger an appropriate defensive response. The effectiveness of the model and the associated framework is demonstrated by considering ransomware as the offending APT in a networked system.

Cite

CITATION STYLE

APA

Baksi, R. P., & Upadhyaya, S. J. (2020). Decepticon: A hidden markov model approach to counter advanced persistent threats. In Communications in Computer and Information Science (Vol. 1186 CCIS, pp. 38–54). Springer. https://doi.org/10.1007/978-981-15-3817-9_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free