Abstract
Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the most challenging attacks to detect. They span over long periods of time, use encrypted connections and mimic normal behaviors in order to evade detection based on traditional defensive solutions. We propose an innovative approach that is able to analyze efficiently high volumes of network traffic to reveal weak signals related to data exfiltrations and other suspect APT activities. The final result is a ranking of the most suspicious internal hosts; this rank allows security specialists to focus their analyses on a small set of hosts out of the thousands of machines that typically characterize large organizations. Experimental evaluations in a network environment consisting of about 10K hosts show the feasibility and effectiveness of the proposed approach. Our proposal based on security analytics paves the way to novel forms of automatic defense aimed at early detection of APTs in large and continuously varying networked systems.
Original language | English |
---|---|
Pages (from-to) | 127-141 |
Number of pages | 15 |
Journal | COMPUTER NETWORKS |
Volume | 109 |
Early online date | 1 Jun 2016 |
DOIs | |
Publication status | Published - 9 Nov 2016 |
Keywords
- Advanced Persistent Threats
- Data exfiltration
- Security analytics
- Traffic analysis