MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

Here we report on the issue of Advanced Persistent Threats (APT), which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS) that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

[1]  Mohammad Malkawi,et al.  Artificial neuro fuzzy logic system for detecting human emotions , 2012 .

[2]  Fei Wang,et al.  ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences , 2013, Math. Comput. Model..

[3]  Xiangyu Li,et al.  A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise , 2014 .

[4]  Christoforos Ntantogian,et al.  An advanced persistent threat in 3G networks: Attacking the home network from roaming networks , 2014, Comput. Secur..

[5]  Omayya Murad,et al.  Artificial neuro fuzzy logic system for detecting human emotions , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[6]  Lior Rokach,et al.  Novel active learning methods for enhanced PC malware detection in windows OS , 2014, Expert Syst. Appl..

[7]  Guangjun Liu,et al.  Homomorphic Subspace MAC Scheme for Secure Network Coding , 2013 .

[8]  Julian Jang,et al.  A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..

[9]  Thuc Dinh Nguyen,et al.  Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer , 2013, J. Inf. Process. Syst..

[10]  Jie He,et al.  Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Latifa Ben Arfa Rabai,et al.  Classification of Security Threats in Information Systems , 2014, ANT/SEIT.

[12]  Xiaofeng Liao,et al.  Dynamical analysis and control strategies on malware propagation model , 2013 .

[13]  Igor Santos,et al.  Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..

[14]  Douglas S. Reeves,et al.  Deriving common malware behavior through graph clustering , 2011, ASIACCS '11.

[15]  Yi Qin,et al.  SmSD : A Smart Secure Deletion Scheme for SSDs , 2014 .

[16]  Tarique Mustafa Malicious Data Leak Prevention and Purposeful Evasion Attacks: An approach to Advanced Persistent Threat (APT) management , 2013, 2013 Saudi International Electronics, Communications and Photonics Conference.

[17]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[18]  Madihah Mohd Saudi,et al.  An Efficient Trojan Horse Classification (ETC) , 2013 .

[19]  Anupama Sharma,et al.  Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..

[20]  Hassan Rasheed,et al.  Data and infrastructure security auditing in cloud computing environments , 2014, Int. J. Inf. Manag..

[21]  Elijah Blessing Rajsingh,et al.  ColShield: an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks , 2014, Human-centric Computing and Information Sciences.

[22]  R. Anitha,et al.  Malware detection by pruning of parallel ensembles using harmony search , 2013, Pattern Recognit. Lett..

[23]  Om Prakash Verma,et al.  Simple Fuzzy Rule Based Edge Detection , 2013, J. Inf. Process. Syst..