NUST Institutional Repository

Host based Detection Mechanism against Advanced Persistent Threat Data Exfiltration

Show simple item record

dc.contributor.author Faheem, Muhammad
dc.date.accessioned 2020-10-28T11:13:10Z
dc.date.available 2020-10-28T11:13:10Z
dc.date.issued 2014
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/6670
dc.description Supervisor: Dr. Fauzan Mirza en_US
dc.description.abstract In the recent days of digital world, Advanced Persistent Threats (APTs) have evolved as a major security threat. APTs are not only a primary weapon cur- rently used by attackers in cyber warfare, but it is also biggest threat to the organizations that acquire, store or process sensitive data as their Intellectual property or in any other form. Unlike computer viruses and worms which are usually non-targeted malicious software, APTs are highly targeted at- tacks launched against a specific target and the attacker is motivated enough persist until the objective is achieved. The motivations behind APTs can be numerous but usually divided into two major categories. They are either launched for the destruction of the target or to acquire the sensitive data stored at a particular place. APT is an organized activity consisting of 3 major lifecycle phases. In the first phase, the attacker gathers intelligence about the vulnerabilities of the target that can help in entering targets premises which, in usual case, is the network of the organization protected by perimeter security devices such as firewalls and IDS/IPS. These vulnerabilities are taken into account in the second phase and the attacker develops and launches the mechanisms, mostly in the form of specialized malware, and compromises the security measures of the target. Once the attacker has entered into the premises, it steps into the completion of its objective which can either be destruction of the target or exfiltration of sensitive data. In our research, we feature the APTs which are launched against organiza- ii iii tions to acquire their sensitive data. This corresponds to the last phase of APT Lifecycle which leads to the fact that organizations should devise mech- anisms to protect their sensitive data from unauthorized exfiltration. Cur- rently, deployed security devices including Firewalls and Intrusion Detection Systems (IDSs) are unable to prevent against data exfiltration because once the attacker has penetrated inside the network, he is undoubtedly well aware of the weaknesses of these security devices and easily able to adopt legitimate methods to search and steal sensitive data. Furthermore, organizations usu- ally employ access control mechanisms against unauthorized access which, in case of APTs, are also defeated through privilege escalation. Specific to data exfiltration, we present a host based approach that is able to detect the unauthorized leakage of the data. Our mechanism makes the use of techniques like DLL Injection and API Hooking to monitor actions performed by all running processes in the system. These actions specifically include certainWindows APIs that are necessary to be called if an exfiltration attempt is in progress. We monitor the API calls performed by the processes by injecting a custom made DLL into them. Our DLL is capable of hijacking the sensitive API calls and stop the execution of a process if an exfiltration activity is observed. Our system successfully detects the data exfiltration activity on real-time basis, does not require any learning phase, puts very low computation overhead and is independent of the network characteristics, such as protocol used for exfiltration. en_US
dc.publisher SEECS, National University of Science & Technology en_US
dc.subject Host based Detection Mechanism, Data Exfiltration, Advanced Persistent Threat, Computer and Communication Security en_US
dc.title Host based Detection Mechanism against Advanced Persistent Threat Data Exfiltration en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [375]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account