Analysing the Feasibility of Portable Passive Detection of Advanced Persistent Threats Research Project 2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Rise of China's Hacking Culture: Defining Chinese Hackers
California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of aduateGr Studies 6-2016 The Rise of China's Hacking Culture: Defining Chinese Hackers William Howlett IV California State University - San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/etd Part of the Asian Studies Commons, Criminology and Criminal Justice Commons, International Relations Commons, Politics and Social Change Commons, and the Science and Technology Studies Commons Recommended Citation Howlett, William IV, "The Rise of China's Hacking Culture: Defining Chinese Hackers" (2016). Electronic Theses, Projects, and Dissertations. 383. https://scholarworks.lib.csusb.edu/etd/383 This Thesis is brought to you for free and open access by the Office of aduateGr Studies at CSUSB ScholarWorks. It has been accepted for inclusion in Electronic Theses, Projects, and Dissertations by an authorized administrator of CSUSB ScholarWorks. For more information, please contact [email protected]. THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino In Partial Fulfillment of the Requirements for the Degree Master of Arts in Social Sciences and Globalization by William Sedgwick Howlett June 2016 THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino by William Sedgwick Howlett June 2016 Approved by: Cherstin Lyon, Committee Chair, Social Sciences and Globalization Jeremy Murray, Committee Member, History Jose Munoz, Committee Member, Sociology © 2016 William Sedgwick Howlett ABSTRACT China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. -
A Temperate Alternative to Cyber Insecurity
Authorized Investigation: A Temperate Alternative to Cyber Insecurity Casey M. Bruner* “Wage war honorably. You may be obliged to wage war but not to use poison arrows.”1 -Baltasar Gracián I. INTRODUCTION In 2011, “Operation Shady RAT” became universally known as one of the most widespread and pervasive cyber espionage campaigns ever discovered.2 The security breach, which persisted over a five-year period, infected more than seventy organizations worldwide including: federal and state government entities, high-tech and communications businesses, thirteen different national defense contractors, and the International Olympic Committee, among others.3 The Operation Shady RAT vulner- ability promulgated the way most computer viruses do: through an email and an attachment.4 An employee of one of the infected defense contrac- tors received an email with an Excel file attached.5 The file contained a * Casey Bruner is a J.D. Candidate at Seattle University School of Law. He previously served as Project Manager for the National Bureau of Asian Research (NBR) and for the Commission on the Theft of American Intellectual Property (IP Commission). The views, opinions, and policy recom- mendations contained in this paper are his alone and do not necessarily reflect the views of NBR, the IP Commission, or any other organization. 1. BALTASAR GRACIÁN, THE ART OF WORLDLY WISDOM 67 (Joseph Jacobs trans., Dover Publications 2005) (1653). 2. See DMITRI ALPEROVITCH, MCAFEE, REVEALED: OPERATIONS SHADY RAT (2011), http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf; see also WILLIAM C. HANNAS ET AL., CHINESE INDUSTRIAL ESPIONAGE: TECHNOLOGY ACQUISITION AND MILITARY MODERNIZATION 220 (2013) (stating that some experts believe that the “Shady RAT” vulnerability originated in China). -
MASTER THESIS Cyber Attribution: Problem Solved?
MASTER THESIS Cyber Attribution: Problem Solved? Analyzing the Communication of Blame and Evidence for Nation-State Involvement in Cyber Operations, 1998-2018 Author: K.M. (Koen) van den Dool Student Number: S1747525 E-Mail: [email protected] Date: June 6, 2018 Word count: 20237 Supervisor: Prof. Dr. B. van den Berg Second Reader: Mr. S. Boeke Program: MSc in Crisis and Security Management Faculty of Governance and Global Affairs – Universiteit Leiden Master Thesis | K.M. van den Dool Table of Contents 1. INTRODUCTION ...................................................................................................... 4 2. THEORY: ATTRIBUTION OF CYBER OPERATIONS ...................................................... 8 2.1. Defining Cyber Operations ............................................................................ 8 2.2. Attribution in Cyberspace ............................................................................ 11 2.2.1. Identification ............................................................................................. 12 2.2.2. Response ................................................................................................. 21 2.2.3. Communication ........................................................................................ 28 3. ANALYSIS: BLAME AND EVIDENCE IN CYBER ATTRIBUTION ..................................... 31 3.1. Methodology ................................................................................................ 31 3.1.1. Case Selection ........................................................................................ -
UC Irvine UC Irvine Electronic Theses and Dissertations
UC Irvine UC Irvine Electronic Theses and Dissertations Title Regulating Cyber Space: An Examination of U.S.-China Relations Permalink https://escholarship.org/uc/item/9jb873k7 Author Ghazi-Tehrani, Adam Kavon Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, IRVINE Regulating Cyber Space: An Examination of U.S.-China Relations DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR IN PHILOSOPHY in Social Ecology by Adam Ghazi-Tehrani Dissertation Committee: Professor Emeritus Henry N. Pontell, Chair Professor John Dombrink Professor Elliott Currie 2016 © 2016 Adam KaVon Ghazi-Tehrani DEDICATION This dissertation is dedicated to: My dear, loVed family: my father, mother, sisters, and brother-in-law. I know I forgot birthdays, never called frequently enough, and have been generally “busy.” Hopefully, that’s all over. My extended family: the cherished aunts and uncles, cousins, and grandparents. To my grandparents, especially, I wish you could haVe seen this. My friends: Julie Gerlinger, who truly deserVes her own “thank you” page, nothing I say here could eVer be enough; Michael Ridino, my brother in arms, my fiercest companion; Tori Warwick, you’Ve supported me through thick and thin, eVen when others told you not to; Eric Parsons, Westley Nunn, Todd Gerlinger, and Tucker Biggs, I trust you each with my life, Virtual or otherwise; and Rashad Almomani, we’ve drifted apart, let’s fix that. -
Detecting Advanced Persistent Threats Through Deception Techniques
Detecting Advanced Persistent Threats through Deception Techniques Nikolaos Virvilis-Kollitiris Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Dept. of Informatics, Athens University of Economics & Business 76 Patission Ave., Athens GR-10434, Greece [email protected] Abstract The number and complexity of cyber-attacks has been increasing steadily in recent years. The major players in today’s cyber conflicts are well organized and heavily funded teams with spe- cific goals and objectives, working for or supported by a nation-state. A commonly used term to describe such teams/groups is Advanced Persistent Threat (APT). APT target the communi- cation and information systems of government, military and industrial organizations and are willing to use vast amounts of money, time and expertise to reach their goals. A clear indication of the level of sophistication of APT is their impressive arsenal. The complexity and capabilities of recently discovered malware used to facilitate such attacks are remarkable: Stuxnet, Duqu, Flame, Red October, MiniDuke and more recently Regin are examples of highly sophisticated malware, the development of which required skillful individuals - in some cases (e.g. Stuxnet) with expertise in multiple technology fields - as well as substantial financial resources. In ad- dition, serious insider attacks have occurred that resulted in the publication of several thousand classified documents, highlighting the fact that even in sensitive institutions, the effectiveness of the existing security safeguards is insufficient. Advances in attacker sophistication have not been matched by similar defensive advances. The concept of keeping the internal, trusted net- work separated from the external, untrusted one (i.e. boundary protection) has become obsolete. -
Nation-State Attackers and Their Effects on Computer Security
Nation-State Attackers and their Effects on Computer Security by Andrew Springall A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in the University of Michigan 2018 Doctoral Committee: Professor J. Alex Halderman, Chair Research Professor Peter Honeyman Professor Atul Prakash Assistant Professor Florian Schaub Andrew Springall [email protected] ORCID: 0000-0001-5999-9881 ©Andrew Springall 2018 Acknowledgments This dissertation, the research inside and outside of it, and so many more things would not be possible without the support of an innumerable number of people. I first want to thank my advisor, J. Alex Halderman for everything. The guidance, encouragement, advice, and freedom he’s given me over the last five years is nothing short of miraculous. I also want to thank Peter Honeyman for his steadfast view- points and willingness to openly challenge my perspective over the years. I’d also like to thank my labmates Zakir Durumeric, Eric Wustrow, James Kasten, David Adrian, Ariana Mirian, Benjamin VanderSloot, Matthew Bernhard, Allison Mc- Donald, and Chris Dzombak for their help, willingness to put up with me, and the wonderful discussions. To Mom, the prayers and pleadings to finish high school, and later college, have gotten me here and although I dismissed them at the time, they were undoubtedly needed and welcome. To Dad. you know. To the Marines, Sol- diers, Sailors, and Airmen from Parris Island, California, Maryland, Iraq, and Afghanistan, I can credit you for the mindset and insanity needed to get me this far. To Goose, Katherine, Ariana, and Cecylia, you’ve helped me keep what little of my sanity I have left throughout all this.