论文标题
企业网络中基于角色的欺骗
Role-Based Deception in Enterprise Networks
论文作者
论文摘要
从历史上看,企业网络侦察是一个积极的过程,通常涉及港口扫描。但是,随着路由器和开关变得更加复杂,它们也变得越来越容易受到妥协。从这个有利的角度来看,攻击者可以被动地识别高价值主机,例如IT管理员,C-Suite高管和财务人员的工作站。本文的目的是开发一种欺骗和劝阻这种对手的技术。我们提出了蜂蜜,它使用蜂蜜连接来建立围绕属于高价值组织角色的客户端主机网络流量的隐喻干草堆。蜂蜜的连接还充当网络金融,以信号网络妥协,从而阻止对手对网络流中观察到的信息作用。我们使用OpenFlow SDN控制器设计了蜂蜜的原型实现,并使用Prism概率模型检查器评估其安全性。我们的绩效评估表明,蜂蜜对网络请求的完成时间的影响很小,我们的安全分析表明,一旦提高警报,蜜孔就可以迅速以很高的可能性识别受损的开关。在此过程中,我们表明,基于角色的网络欺骗是一种防御已损害网络设备的对手的有前途的方法。
Historically, enterprise network reconnaissance is an active process, often involving port scanning. However, as routers and switches become more complex, they also become more susceptible to compromise. From this vantage point, an attacker can passively identify high-value hosts such as the workstations of IT administrators, C-suite executives, and finance personnel. The goal of this paper is to develop a technique to deceive and dissuade such adversaries. We propose HoneyRoles, which uses honey connections to build metaphorical haystacks around the network traffic of client hosts belonging to high-value organizational roles. The honey connections also act as network canaries to signal network compromise, thereby dissuading the adversary from acting on information observed in network flows. We design a prototype implementation of HoneyRoles using an OpenFlow SDN controller and evaluate its security using the PRISM probabilistic model checker. Our performance evaluation shows that HoneyRoles has a small effect on network request completion time and our security analysis demonstrates that once an alert is raised, HoneyRoles can quickly identify the compromised switch with high probability. In doing so, we show that a role-based network deception is a promising approach for defending against adversaries that have compromised network devices.