Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach

Lateral movement attacks are a serious threat to enterprise security. In these attacks, an attacker compromises a trusted user account to get a foothold into the enterprise network and uses it to attack other trusted users, increasingly gaining higher and higher privileges. Such lateral attacks are very hard to model because of the unwitting role that users play in the attack and even harder to detect and prevent because of their low and slow nature. In this paper, a theoretical framework is presented for modeling lateral movement attacks and for proposing a methodology for designing resilient cyber systems against such attacks. The enterprise is modeled as a tripartite graph capturing the interaction between users, machines, and applications, and a set of procedures is proposed to harden the network by increasing the cost of lateral movement. Strong theoretical guarantees on system resilience are established and experimentally validated for large enterprise networks.

[1]  John Dunagan,et al.  Active Graph Reachability Reduction for Network Security and Software Engineering , 2011, IJCAI.

[2]  Indrajit Ray,et al.  Action Recommendation for Cyber Resilience , 2015, SafeConfig@CCS.

[3]  XiaoFeng Wang,et al.  Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating , 2014, 2014 IEEE Symposium on Security and Privacy.

[4]  Alfred O. Hero,et al.  Assessing and safeguarding network resilience to nodal attacks , 2014, IEEE Communications Magazine.

[5]  Lawrence B. Holder,et al.  Towards a network-of-networks framework for cyber security , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[6]  Bradley Malin,et al.  Detecting Anomalous Insiders in Collaborative Information Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[7]  Christos Faloutsos,et al.  Fractional Immunization in Networks , 2013, SDM.

[8]  Pili Hu,et al.  How to Leak a 100-Million-Node Social Graph in Just One Week?-A Reflection on OAuth and API Design in Online Social Networks , 2014 .

[9]  Chun-Ying Huang,et al.  Decapitation via digital epidemics: a bio-inspired transmissive attack , 2016, IEEE Communications Magazine.

[10]  Harriet Goldman,et al.  Cyber resilience for mission assurance , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[11]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[12]  Michalis Faloutsos,et al.  Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.

[13]  Ranjita Bhagwan,et al.  Baaz: A System for Detecting Access Control Misconfigurations , 2010, USENIX Security Symposium.

[14]  Piet Demeester,et al.  Resilience in multilayer networks , 1999, IEEE Commun. Mag..

[15]  Kwang-Cheng Chen,et al.  On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.

[16]  Mehran Mesbahi,et al.  Controllability and Observability of Network-of-Networks via Cartesian Products , 2014, IEEE Transactions on Automatic Control.

[17]  Hanghang Tong,et al.  Inside the atoms: ranking on a network of networks , 2014, KDD.

[18]  Kwang-Cheng Chen,et al.  Optimal Control of Epidemic Information Dissemination Over Networks , 2014, IEEE Transactions on Cybernetics.

[19]  Hanghang Tong,et al.  MET: A Fast Algorithm for Minimizing Propagation in Large Graphs with Small Eigen-Gaps , 2015, SDM.

[20]  Niels Provos,et al.  Preventing Privilege Escalation , 2003, USENIX Security Symposium.

[21]  Satoru Fujishige,et al.  Submodular functions and optimization , 1991 .

[22]  Ahmad-Reza Sadeghi,et al.  Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.

[23]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[24]  Harry Eugene Stanley,et al.  Robustness of a Network of Networks , 2010, Physical review letters.

[25]  Hanghang Tong,et al.  Make It or Break It: Manipulating Robustness in Large Networks , 2014, SDM.