使用 siem 规则集检测高级持续性威胁

Adem Şi̇mşek, A. Koltuksuz
{"title":"使用 siem 规则集检测高级持续性威胁","authors":"Adem Şi̇mşek, A. Koltuksuz","doi":"10.36962/piretc28072023-25","DOIUrl":null,"url":null,"abstract":"Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. In today's digitalized life, these attacks threaten the main critical life areas. This threat is followed by critical infrastructures, finance, energy, and aviation agencies. One of the biggest APT attacks was Stuxnet which targeted software on computers controlling the programmable logic controllers (PLCs) used to automate machine processes. The other one was the Deep Panda attack discovered in 2015 which compromised over 4 million US personnel records because of the ongoing cyberwar between China and the U.S. This paper attempts to explain the difficulties of detecting APTs and to examine the studies in this area. In addition, this paper presents a new approach to detecting APTs using the SIEM solution. In this approach, it is recommended to establish APT rulesets in SIEM solutions by using the indicators left behind by the attacks. In the rulesets, 3 basic indicator types are considered, and examples are shared. Keywords: Cyber security, cyber war, APT, SIEM, Intrusion Detection System.","PeriodicalId":107886,"journal":{"name":"PIRETC-Proceeding of The International Research Education & Training Centre","volume":"9 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS\",\"authors\":\"Adem Şi̇mşek, A. Koltuksuz\",\"doi\":\"10.36962/piretc28072023-25\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. In today's digitalized life, these attacks threaten the main critical life areas. This threat is followed by critical infrastructures, finance, energy, and aviation agencies. One of the biggest APT attacks was Stuxnet which targeted software on computers controlling the programmable logic controllers (PLCs) used to automate machine processes. The other one was the Deep Panda attack discovered in 2015 which compromised over 4 million US personnel records because of the ongoing cyberwar between China and the U.S. This paper attempts to explain the difficulties of detecting APTs and to examine the studies in this area. In addition, this paper presents a new approach to detecting APTs using the SIEM solution. In this approach, it is recommended to establish APT rulesets in SIEM solutions by using the indicators left behind by the attacks. In the rulesets, 3 basic indicator types are considered, and examples are shared. Keywords: Cyber security, cyber war, APT, SIEM, Intrusion Detection System.\",\"PeriodicalId\":107886,\"journal\":{\"name\":\"PIRETC-Proceeding of The International Research Education & Training Centre\",\"volume\":\"9 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PIRETC-Proceeding of The International Research Education & Training Centre\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36962/piretc28072023-25\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PIRETC-Proceeding of The International Research Education & Training Centre","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36962/piretc28072023-25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络攻击正朝着复杂、具有破坏性和持续性的方向发展,如 Stuxnet、Dark Hotel、Poseidon 和 Carbanak。这些攻击被称为 "高级持续性威胁"(APT),入侵者会在网络中建立一个未被发现的存在,以便长期窃取敏感数据。在当今的数字化生活中,这些攻击威胁着主要的关键生活领域。紧随其后的是关键基础设施、金融、能源和航空机构。最大的 APT 攻击之一是 Stuxnet,其目标是控制用于自动化机器流程的可编程逻辑控制器 (PLC) 的计算机软件。另一次是 2015 年发现的 "深度熊猫 "攻击,由于中美之间持续的网络战,该攻击泄露了 400 多万条美国人员记录。本文试图解释检测 APT 的困难,并考察该领域的研究。此外,本文还提出了一种利用 SIEM 解决方案检测 APT 的新方法。在这种方法中,建议在 SIEM 解决方案中利用攻击留下的指标建立 APT 规则集。在规则集中,考虑了 3 种基本指标类型,并分享了实例。关键词网络安全 网络战争 APT SIEM 入侵检测系统
本文章由计算机程序翻译,如有差异,请以英文原文为准。
DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time. In today's digitalized life, these attacks threaten the main critical life areas. This threat is followed by critical infrastructures, finance, energy, and aviation agencies. One of the biggest APT attacks was Stuxnet which targeted software on computers controlling the programmable logic controllers (PLCs) used to automate machine processes. The other one was the Deep Panda attack discovered in 2015 which compromised over 4 million US personnel records because of the ongoing cyberwar between China and the U.S. This paper attempts to explain the difficulties of detecting APTs and to examine the studies in this area. In addition, this paper presents a new approach to detecting APTs using the SIEM solution. In this approach, it is recommended to establish APT rulesets in SIEM solutions by using the indicators left behind by the attacks. In the rulesets, 3 basic indicator types are considered, and examples are shared. Keywords: Cyber security, cyber war, APT, SIEM, Intrusion Detection System.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信