Skip to main content

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

  • Conference paper
Computational Science and Its Applications – ICCSA 2012 (ICCSA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7336))

Included in the following conference series:

Abstract

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Salem, M.B., Hershkop, S., Stolfo, S.J.: A Survey of Insider Attack Detection Research. Advances in Information Security 39, 69–90 (2008)

    Article  Google Scholar 

  2. The eighth annual CSI/FBI 2003 report: Computer Crime and Security Survey (2003)

    Google Scholar 

  3. Stone, C.: Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration, Office of The Director of National Intelligence, Washington, DC (March 2011)

    Google Scholar 

  4. Bellovin, S.: The Insider Attack Problem Nature and Scope. Advances in Information Security 39, 69–90 (2008)

    Article  Google Scholar 

  5. Braz, F.A., Fernandez, E.B., VanHilst, M.: Eliciting Security Requirements through Misuse Activities. In: Proceedings of the 2008 19th International Conference on Database and Expert Systems Application (DEXA), pp. 328–333 (2008)

    Google Scholar 

  6. Bellovin, S.: There Be Dragons. In: Proc. of the Third Usenix Security Symposium, Baltimore MD (September 1992)

    Google Scholar 

  7. Bellovin, S.M.: Packets Found on an Internet. Computer Communications Review 23(3), 26–31 (July)

    Google Scholar 

  8. Spitzner, L.: Honeypots: Catching the Insider Threat. In: 19th Annual Computer Security Applications Conference (ACSAC 2003), p. 170 (2003)

    Google Scholar 

  9. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)

    Google Scholar 

  10. Lyon, G.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security. Insecure Publisher, USA (2009) ISBN 9780979958717

    Google Scholar 

  11. Sun, Y., Luo, Y., Wang, X., Wang, Z., Zhang, B., Chen, H., Li, X.: Fast Live Cloning of Virtual Machine Based on Xen. In: 2009 11th IEEE International Conference on High Performance Computing and Communications, HPCC 2009, pp. 392–399 (2009)

    Google Scholar 

  12. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)

    Google Scholar 

  13. Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, pp. 273–286 (May 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cui, X., Gasior, W., Beaver, J., Treadwell, J. (2012). ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2012. ICCSA 2012. Lecture Notes in Computer Science, vol 7336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31128-4_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31128-4_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31127-7

  • Online ISBN: 978-3-642-31128-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics