Deception has been proposed in the literature as an effective defense mechanism to address Advanced Persistent Threats (APT). However, administering deception in a cost-effective manner requires a good understanding of the attack landscape. The attacks mounted by APT groups are highly diverse and sophisticated in nature and can render traditional signature based intrusion detection systems useless. This necessitates the development of behavior oriented defense mechanisms. In this paper, we develop Decepticon (Deception-based countermeasure) a Hidden Markov Model based framework where the indicators of compromise (IoC) are used as the observable features to aid in detection. This framework would help in selecting an appropriate deception script when faced with APTs or other similar malware and trigger an appropriate defensive response. The effectiveness of the model and the associated framework is demonstrated by considering ransomware as the offending APT in a networked system.
CITATION STYLE
Baksi, R. P., & Upadhyaya, S. J. (2020). Decepticon: A hidden markov model approach to counter advanced persistent threats. In Communications in Computer and Information Science (Vol. 1186 CCIS, pp. 38–54). Springer. https://doi.org/10.1007/978-981-15-3817-9_3
Mendeley helps you to discover research relevant for your work.