You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

3 December 2014

MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

,
,
and
1
Network Security Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700, Korea
2
Department of Computer Science and Engineering and Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology, SeoulTech, 172 Gongreung 2-dong, Nowon-gu, Seoul 139-743, Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Applied Cryptography and Security Concerns based on Symmetry for the Future Cyber World

Abstract

Here we report on the issue of Advanced Persistent Threats (APT), which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS) that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

1. Introduction

The rise in the use of computers and the growth of the internet brought about cyber-crimes [1]. In an attempt to identify ways to prevent cyber-crimes, many studies have been conducted on security related systems. Meanwhile, cyber-attacks have become more sophisticated than ever. In response to the developments, the way the attack and defense between cyber-crimes and information security technologies occur have become increasingly complicated [2]. One of the most complex and advanced cyber-attacks in recent years is the Advanced Persistent Threat (APT), which attacks corporations and government agencies. An APT attack is one of the major cyber-attacks in addition to targeted attack. It is a module to use all the things known about the attack [3]. The some of the prominent cases for APT attack include Stuxnet, Duqu, Red October, Mask, etc., and each of these attacks had a different target and purpose. An APT attack sets a target, unlike malwares such as Bot, Trojan and Worm, and conducts a sophisticated attack continuously. Those conventional attacks target unspecified individuals as relevant symptoms appear immediately with a single attack. On the other hand, APT attack avoids detection and leaks the information the attacker wants. In general, APT attacks aim to destruct industrial infrastructure and collect important corporate information. In addition, it finds and detects the vulnerable aspects of target companies and attempts an initial intrusion by analyzing technical information and personnel information with the aim of finding a target system along with the information of a target corporation, such as the corporation’s objectives and antivirus capabilities based on a social engineering technique. As a result, it is difficult to defend initial intrusion with conventional antivirus systems [4]. Moreover, malicious software, which infiltrates into the target corporation, contains a variety of attack modules to achieve an objective. Thus, APT attack poses a huge risk and requires a new defense technique [5].
In this paper, we propose a Multi-Layer Defense System (MLDS) to monitor malware through collecting the log data, setting data and traffic data of various devices by installing network application, server and agent at an end-user in order to defend from continuous and elaborate APT attacks. We define the MLDS as a defense system which can prevent APT attack across multiple layers of TCP/IP. As a result, it can minimize the possibility of intrusion through malware and damages by promptly responding to a detected attack.
This paper consists of a total of 4 sections. In Section 2, Related Works, we discuss APT attack cases, attack phases and malware detection technologies. Section 3 discusses the proposed system and presents a service scenario. Finally, Section 4 presents concluding remarks and briefly discusses future works.

3. MLDS

3.1. Architecture

MLDS prevents malware infection for a target system by collecting and analyzing information from network appliance, server and end-user. The proposed MLDS consists of a total of 8 components (Classifier, Analyzer, Agent Manager, Server Monitor, End-user Manager, Network Monitor, Log Manager and Storage). Figure 1 shows the architecture of the MLDS.
Figure 1. Architecture of MLDS.
The Time Synchronizer module provides synchronization function for time. It provides reliability for log data by synchronizing time with components.
The Reporter module serves the communication between components. This module receives the data from various components such as the Analyzer, Log Manager, Storage, End-user Manager, Server Monitor and Network Monitor, then the information is passed to the other components.
The Analyzer component analyzes suspicious malware transferred by End-user Manager, Server Monitor and Network Monitor with aid of two modules. The Static Analysis module includes the signature and hash value of a file. The Dynamic Analysis module includes the sandbox, behavior based detection technique, etc. This component precisely analyzes suspicious files as malware translated by the End-user Manager, Network Monitor and Server Monitor. If the transferred file or traffic is malicious, analysis information of file will be sent to the Classifier.
The Classifier component is composed of two modules, the Classification module and the Action module. The Classification module has Risk Level Information and Alert Level Information. Risk Level Information means risk information that has already been detected as having malware. Alert Level information means warning information depending on location (server, end-user, or network) in which the malware attacks will be posted. Two kinds of the information help the Classification module to efficiently classify the malwares. The Classification module receives analysis information about the malwares from Analyzer component, then classifies the risk level and alert level based on behavior of the malwares. The Action module instructs the reaction and alerts the Agent Manager using the classified information.
The Agent Manager component includes four modules, such as View, Command, Gathering and Transmit. It manages the agents to run network appliances, servers and end-users that are present outside. The View module allows a system administrator to check the current state of the MLDS. The Command module transfers the command which is received through the Action module or the Reporter module and sent to agents. The Gathering module collects information coming from each agent. In addition, the Transmit module sends the gathered information to the End-user Manager, Server Monitor, and Network Monitor components.
The End-user Manager component is composed of Network Control, Threat Prevention, and the Initial Classification module. The Network Control module has a Network Configuration Information and a list of end users. If malware is detected by the end-user, Network Control module will exclude infected end-user on network. The Threat Prevention module automatically updates in order to maintain the latest version of the application in end-users. The Initial Classification module observes the running processes in the end-users. If a system configuration is changed or altered anomaly, this information will be sent to the Analyzer component.
The Server Monitor relies on following modules: Condition Manager, Port Control, Threat Prevention and Initial Classification. The Condition Manager module can check the state of a server through process info, active status and whitelist. Port Control module control the connectable port to the server. Initial Classification and Threat Prevention can conduct the same operation as module of the End-user Manager.
The Network Monitor consists of three modules. The Traffic Analyzer module can analyze traffic with information such as the network signature, traffic frequency, network information and whitelist. Network signature information stores the signature of malicious network traffics. Traffic frequency information means the pre-determined maximum amount of traffic for each piece of network equipment. In addition, the whitelist has information about approved traffic. Network information has the network configuration and Access Control List (ACL). The Network Monitor component can extract traffics deemed malicious file through the Extraction module and it can also conduct network congestion control through Network Congestion module.
The Log Manager contains the Audit Trail and Log Analyzer module. The Log Analyzer module receives the log, whose abnormal acts are detected by the Server Monitor, End-user Manager and Network Monitor Component. The Audit Trail module finds an end-user where malicious software is installed through analyzed log.
Storage is the module to save the information about network, server and end-user from network monitor, server monitor and end-user manager. It helps in analyzing the malware by transmitting the saved information to other modules when malicious software is detected later.

3.2. Service Scenario

In this section, we discuss a service scenario for the proposed MLDS. The marks used in the service scenario proposed in this section are as shown in Table 3. In addition, Figure 2 represents the scenario for detecting APT attack as to 1, 3, 4, 5, 6 among the steps of APT attack mentioned in Section 2.2.
Table 3. Definition of acronyms.
Figure 2. Detection Scenario of Step 1, 3, 4, 5, 6.
Step 1 (Detection Scenario of Step 1, 3, 4, 5, 6). See Figure 2.
  • AM → NM: sending an network traffic
    AM collects data from the network agent and transmits it to the network manager.
  • NM: analyzing the traffic
    NM analyzes traffic through various module such as network signature, traffic frequency and whitelisting.
  • NM → CF: sending the suspicious traffic
    When suspicious traffic is detected by the traffic analysis module of NM, it passes to the CF.
  • CF: classify suspicious
    CF classifies malicious traffics in accordance with risk level through Classify module.
  • CF → AM: classify information
    When certain traffic is classified as malicious by CF, AM is notified to protect the system from APT attacks.
Step 2 (Detection Scenario of Step 3). See Figure 3.
  • AM → NM: sending E-mail and Web Traffic
    Emails from each agent and network traffic data are delivered to AM as well.
  • NM → AZ: sending a suspicious file
    NM analyzes the traffic. When it detects any abnormality, the network stream extracts the file. It then transfers the file to AZ.
  • AZ: analyzing the file
    Basically, AZ determines if certain files are malicious by means of the static analysis module and then enhances the efficiency of detection by means of the dynamic analysis module.
  • AZ → CF: sending an detected file
    If a file is deemed as malware, it transmits the information to CF.
  • CF: classifying the file
    CF classifies the files in accordance with the detected risk level.
  • CF → AM: sending information
    When certain classified traffic is found dangerous, AM is notified to protect the system from APT attacks.
Figure 3. Detection Scenario of Step 2.
Step 3 (Detection Scenario of Step 3). See Figure 4.
  • EM: file analysis
    EM classifies files suspicious of malicious software based on the files transmitted by an end-user’s agent.
  • EM → AZ: sending a classified file
    EM classifies the files saved by users primarily through the Initial Classifier.
  • AZ → CF: sending a detected file
    In the case of those files that are detected for abnormal act, it sends these files to AZ to analyze the presence of malicious files.
  • CF → AM: sending classified information
    CF classifies the risk level of analyzed files and sends this information to AM to synchronize with an end-user.
Figure 4. Detection Scenario of Step 7.

3.3. Case Studies

In this subsection, we present how to defend an intrusion of APT attack using MLDS. Case 1 shows the prevention method for end-user from spear phishing at initial intrusion (Figure 5). Case 2 represents removal technique for end-user from malware infection and transition through USB (Figure 6).
Figure 5. End-User Infection through Spear Phishing.
Figure 6. Prevention method from Infection and Metastasis through USB.

Case 1. Prevention method for end-user form Spear phishing at initial intrusion

At initial step indicates the flow of infected email to an external router. When an email reaches the inbox it is transmitted from the external router to the DMZ server and mirrored in MLDS simultaneously. The mirrored data starts in advance to conduct analysis in MLDS. At this point, when an end-user tries to read the email, the email will be transmitted to the internal router and then delivered to the end-user. Consequently, the end-user downloads the malware in attached files from email or by visiting the linked web pages. Each time the email is transferred, the log is delivered to the MLDS and continues to conduct the analysis. At this point, if malicious software detects malware file in the end-user, then the MLDS informs the presence of an infection to the end-user and shows the trace of malware through the log information. MLDS removes malware from all devices located in infected path for preventing additional infection through tracking down the infected path of the user. Figure 5 represents the defense scenario of MLDS as to the initial intrusion using spear phishing.

Case 2. Prevention method from Infection and Metastasis through USB

When an end-user is infected through USB, malware attempts to infect other end-users in the system. When malware identifies the presence of DMZ server through internal recon, it will infect the DMZ server. At this point, if malicious software is defected in the DMZ server, MLDS informs the DMZ server about the presence of an infection and analyzes the log information to identify the migration path of malicious software. It removes malicious software installed at each end-point based the migration path of malicious software. Figure 6 represents the defense scenario of MLDS for the infection and transition of an end-user through USB.

4. Conclusions

Various cyber threats have brought about numerous damages ranging from privacy information leakage to financial loss, to leakage of confidential corporate information. Of the cyber threats, APT attacks are particularly known for attacking continuously until they acquire long-time access authority or leak information by successfully intruding specific organizations or institutes. They many challenges for security, since they conduct an attack after sufficiently analyzing the vulnerabilities of a target system.
In this paper, we discussed the steps of attack through the cases of APT attack and proposed the need for an in-depth detection system. In this paper, we proposed the Multi-Layer Defense System (MLDS), which can conduct defense in depth by analyzing information of network, server, end-user, log, etc., through installing agents at network appliance, server and end-user. As a result, MLDS detects APT attacks from various layers to enhance the performance. In addition, when the system is affected by APT attacks, MDLS minimizes the damage. In the future, it may be necessary to examine analysis algorithms used for file analysis and traffic analysis of the suggested system to detect malware accurately.

Acknowledgments

This work was sponsored by the Korea Ministry of Science, ICT and Future Plan under Cyber targeted attack recognition and trace-back technology (SINBAPT) Project [13-921-06-001].

Author Contributions

Daesung Moon: design of the total system; Hyungjin Im: mainly writing; Jae Dong Lee: research for the related works, analyzing and improving for the proposed system; Jong Hyuk Park: total supervision for the paper work, review and comments, etc.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Julian, J.-J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar]
  2. Jingle, I.D.J.; Rajsingh, E.B. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Hum.-Centric Comput. Inf. Sci. 2014, 8. [Google Scholar] [CrossRef]
  3. Feng, L.; Liao, X.; Han, Q.; Li, H. Dynamical analysis and control strategies on malware propagation model. Appl. Math. Model. 2013, 37, 8225–8236. [Google Scholar]
  4. Hoang, T.; Nguyen, T.; Luong, C.; Do, S.; Choi, D. Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 2013, 9, 333–348. [Google Scholar]
  5. Misra, A.K.; Verma, M.; Sharma, A. Capturing the interplay between malware and anti-malware in a computer network. Appl. Math. Comput. 2014, 229, 340–349. [Google Scholar]
  6. Xenakis, C.; Ntantogian, C. An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. Comput. Secur. 2014, 40, 84–94. [Google Scholar]
  7. Mustafa, T. Malicious data leak prevention and purposeful evasion attacks: An approach to Advanced Persistent Threat (APT) management, In Proceedings of the Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 27–30 April 2013; pp. 1–5.
  8. Lu, H.; Wang, X.; Zhao, B.; Wang, F.; Su, J. ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 2013, 58, 1140–1154. [Google Scholar]
  9. Sheen, S.; Anitha, R.; Sirisha, P. Malware detection by prunng of parallel ensembles using harmony Search. Pattern Recognit. Lett. 2013, 34, 1140–1154. [Google Scholar]
  10. Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M. A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 2013, 36, 42–57. [Google Scholar]
  11. Liu, G.; Wang, X. Homomorphic subspace MAC scheme for secure network coding. ETRI J 2013, 35, 173–176. [Google Scholar]
  12. Li, X.; Wang, X.; Xu, X.; Jin, L. A distributed implementation algorithm for physical layer security based on untrusted relay cooperation and artificial noise. ETRI J 2014, 36, 183–186. [Google Scholar]
  13. Santos, I.; Brezo, F.; Ugarte-Pedrero, X.; Bringas, P.G. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Inf. Sci. 2013, 231, 64–82. [Google Scholar]
  14. Qin, Y.; Tong, W.; Liu, J.; Zhu, Z. SmSD:A smart secure deletion scheme for SSDs. J. Converg. 2013, 4, 30–35. [Google Scholar]
  15. Younghee, P.; Reeves, D.S.; Stamp, M. Deriving common malware behavior through graph clustering. Comput. Secur. 2012, 39, 419–430. [Google Scholar]
  16. Yong, Q.; He, J.; Yang, Y.; Ji, L. Analyzing malware by abstracting the frequent itemsets in API call sequences, In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Victoria, Australia, 16–18 July 2013; pp. 265–270.
  17. Abuzaid, A.M.; Saudi, M.M.; Taib, B.M.; Zul Hilmi, A. An efficient trojan horse classification (ETC), IJCSI. Int. J. Comput. Sci. Issues. 2013, 10, 96–103. [Google Scholar]
  18. Nissim, N.; Moskovitch, R.; Rokach, L.; Elovici, Y. Novel active learning methods for enhanced PC malware detection in windows OS. Expert Syst. Appl. 2014, 41, 5843–5857. [Google Scholar]
  19. Malkawi, M.; Murad, O. Artificial neuro fuzzy logic system for detecting human emotions. Hum.-Centric Comput. Inf. Sci. 2013. [Google Scholar] [CrossRef]
  20. Verma, O.P.; Jain, V.; Gumber, R. Simple fuzzy rule based edge detection. J. Inf. Process. Syst. 2013, 9, 575–591. [Google Scholar]
  21. Rasheed, H. Data and infrastructure security auditing in cloud computing environments. Int. J. Inf. Manag. 2014, 34, 364–368. [Google Scholar]
  22. Jouini, M.; Rabai, L.B.A.; Aissa, A.B. Classification of security threats in information systems 489–496.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.