Loading [MathJax]/extensions/MathZoom.js
Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks | IEEE Conference Publication | IEEE Xplore

Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks


Abstract:

In contrast to conventional cyber attacks such as mass infection malware, targeted attacks take a long time to complete their mission. By using a dedicated malware for ev...Show More

Abstract:

In contrast to conventional cyber attacks such as mass infection malware, targeted attacks take a long time to complete their mission. By using a dedicated malware for evading detection at the initial attack, an attacker quietly succeeds in setting up a front-line base in the target organization. Communication between the attacker and the base adopts popular protocols to hide its existence. Because conventional countermeasures deployed on the boundary between the Internet and the internal network will not work adequately, monitoring on the internal network becomes indispensable. In this paper, we propose an integrated sandbox system that deploys a secure and transparent proxy to analyze internal malicious network traffic. The adoption of software defined networking technology makes it possible to redirect any internal traffic from/to a suspicious host to the system for an examination of its insidiousness. When our system finds malicious activity, the traffic is blocked. If the malicious traffic is regarded as mandatory, e.g., For controlled delivery, the system works as a transparent proxy to bypass it. For benign traffic, the system works as a transparent proxy, as well. If binary programs are found in traffic, they are automatically extracted and submitted to a malware analysis module of the sandbox. In this way, we can safely identify the intention of the attackers without making them aware of our surveillance.
Date of Conference: 21-25 July 2014
Date Added to IEEE Xplore: 22 September 2014
Electronic ISBN:978-1-4799-3575-8
Electronic ISSN: 0730-3157
Conference Location: Vasteras, Sweden

1. Introduction

In recent years, the increasing number of sophisticated and targeted attacks has become a growing concern. In contrast to conventional cyber attacks, these attacks set goals for gaining access to intellectual property, retrieving personally identifiable information, and sometimes destroying information systems. To evade detection of their existence, it takes long time to complete their mission: as long as months or even years in some cases. A typical targeted cyber attack exhibits the following pattern. First, the attackers exhaustively investigate their target organization via social engineering. In order to obtain initial access to the victim's network, the attackers start with a phishing attack against the targeted company. Selected employees of the victim companies receive an email disguised as a legitimate e-mail from a trusted source. This e-mail contains illegal content such as malware and/or a link to a Web site that hosts a malicious code. If employees open the contents or click the link, thus executing the malware, their host is compromised as a front-line base of the attackers. The attackers initially install a remote administration tool (RAT) into the host to obtain its control. At the base, the attackers silently monitor the activities of the infected host and listen to the communication of the network, thereby obtaining useful information related to the relationships among employees, the workflow of their business, the service running on other hosts, and the structure of the network. Based on such reconnaissance, they move to VIP victims who have authority to access highly valued assets. Eventually, these assets are sabotaged or stolen.

Contact IEEE to Subscribe

References

References is not available for this document.