skip to main content
10.1145/3268966.3268971acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article
Public Access

Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats

Authors Info & Claims
Published:15 January 2018Publication History

ABSTRACT

As evidenced by numerous high-profile security incidents such as the Target data breach and the Equifax hack, APTs (Advanced Persistent Threats) can significantly compromise the trustworthiness of cyber space. This work explores how to improve the effectiveness of cyber deception in hardening FTP (File Transfer Protocol) services against APTs. The main objective of our work is to ensure deception consistency: when the attackers are trapped, they can only make observations that are consistent with what they have seen already so that they cannot recognize the deceptive environment. To achieve deception consistency, we use logic constraints to characterize an attacker's best knowledge (either positive, negative, or uncertain). When migrating the attacker's FTP connection into a contained environment, we use these logic constraints to instantiate a new FTP file system that is guaranteed free of inconsistency. We performed deception experiments with student participants who just completed a computer security course. Following the design of Turing tests, we find that the participants' chances of recognizing deceptive environments are close to random guesses. Our experiments also confirm the importance of observation consistency in identifying deception.

References

  1. https://www.equifaxsecurity2017.com/.Google ScholarGoogle Scholar
  2. Bftpd. http://bftpd.sourceforge.net/.Google ScholarGoogle Scholar
  3. CRIU. https://criu.org/.Google ScholarGoogle Scholar
  4. CVE Details. https://www.cvedetails.com/.Google ScholarGoogle Scholar
  5. File Transfer Protocol. https://en.wikipedia.org/wiki/File_Transfer_Protocol.Google ScholarGoogle Scholar
  6. gFTP. https://www.gftp.org/.Google ScholarGoogle Scholar
  7. Kippo - SSH Honeypot. https://github.com/desaster/kippo.Google ScholarGoogle Scholar
  8. Papers from the Honeynet project. https://www.honeynet.org/papers.Google ScholarGoogle Scholar
  9. ProFTPD. http://www.proftpd.org/.Google ScholarGoogle Scholar
  10. Scapy. http://www.secdev.org/projects/scapy/.Google ScholarGoogle Scholar
  11. CVE-2013--4730. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013--4730, 2013.Google ScholarGoogle Scholar
  12. F. Araujo, K. W. Hamlen, S. Biedermann, and S. Katzenbeisser. From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation. In Proceedings of ACM CCS'14, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Archlinux. Sparse file. https://wiki.archlinux.org/index.php/sparse_file.Google ScholarGoogle Scholar
  14. K. Borders, L. Falk, and A. Prakash. Openfire: Using deception to reduce network attacks. In Proceedings of SecureComm'07. IEEE, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  15. B. Cheswick. An evening with berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter USENIX Conference, 1992.Google ScholarGoogle Scholar
  16. F. Cohen. The use of deception techniques: Honeypots and decoys. 3, 2006.Google ScholarGoogle Scholar
  17. P. Ford-Hutchinson. Securing ftp with tls (rfc 4217). 2005.Google ScholarGoogle Scholar
  18. X. Han, N. Kheir, and D. Balzarotti. Evaluation of deception-based web attacks detection. In Proceedings of ACM Workshop on Moving Target Defense, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Horowitz and S. Lunt. Ftp security extensions (RFC 2228), 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Jajodia, V. Subrahmanian, V. Swarup, and C. Wang. Cyber Deception: Building the Scientific Foundation. Springer, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Jones. Cyber deception via system manipulation. In Proceedings of the 12th International Conference on Cyber Warfare and Security, 2017.Google ScholarGoogle Scholar
  22. M. Korolov. Deception technology grows and evolves. https://www.csoonline.com/article/3113055/security/deception-technology-grows-and-evolves.html.Google ScholarGoogle Scholar
  23. K. McCoy. Target to pay $18.5M for 2013 data breach that affected 41 million consumers. https://www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/.Google ScholarGoogle Scholar
  24. V. Neagoe and M. Bishop. Inconsistency in deception for defense. In Proceedings of the 2006 Workshop on New Security Paradigms. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. T. H. Project. Sebek: A kernel based data capture tool, 2003.Google ScholarGoogle Scholar
  26. N. Provos. Honeyd-a virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, volume 2, page 4, 2003.Google ScholarGoogle Scholar
  27. N. Rowe, H. Goh, S. Lim, and B. Duong. Experiments with a testbed for automated defensive deception planning for cyber-attacks. In Proceedings of the 2nd International Conference on I-Warfare and Security (ICIW'07), 2007.Google ScholarGoogle Scholar
  28. N. C. Rowe. Deception in defense of computer systems from cyber attack. Cyber Warfare and Cyber Terrorism, page 97, 2007.Google ScholarGoogle Scholar
  29. J. Sun and K. Sun. Desir: Decoy-enhanced seamless ip randomization. In Proceedings of INFOCOM'16. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  30. J. Sun, K. Sun, and Q. Li. Cybermoat: Camouflaging critical server infrastructures with large scale decoy farms. In Proceedings of IEEE CNS'17. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  31. J. Yuill, D. Denning, and F. Feer. Using deception to hide things from hackers: Processes, principles, and techniques. Journal of Information Warfare, 5(3), 2006.Google ScholarGoogle Scholar
  32. J. J. Yuill. Defensive computer-security deception operations: Processes, principles and techniques. In Ph.D. Dissertation, North Carolina State University, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MTD '18: Proceedings of the 5th ACM Workshop on Moving Target Defense
      October 2018
      96 pages
      ISBN:9781450360036
      DOI:10.1145/3268966

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 January 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      MTD '18 Paper Acceptance Rate5of5submissions,100%Overall Acceptance Rate40of92submissions,43%

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader