Detecting Advanced Persistent Threats Through Deception Techniques
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Rise of China's Hacking Culture: Defining Chinese Hackers
California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of aduateGr Studies 6-2016 The Rise of China's Hacking Culture: Defining Chinese Hackers William Howlett IV California State University - San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/etd Part of the Asian Studies Commons, Criminology and Criminal Justice Commons, International Relations Commons, Politics and Social Change Commons, and the Science and Technology Studies Commons Recommended Citation Howlett, William IV, "The Rise of China's Hacking Culture: Defining Chinese Hackers" (2016). Electronic Theses, Projects, and Dissertations. 383. https://scholarworks.lib.csusb.edu/etd/383 This Thesis is brought to you for free and open access by the Office of aduateGr Studies at CSUSB ScholarWorks. It has been accepted for inclusion in Electronic Theses, Projects, and Dissertations by an authorized administrator of CSUSB ScholarWorks. For more information, please contact [email protected]. THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino In Partial Fulfillment of the Requirements for the Degree Master of Arts in Social Sciences and Globalization by William Sedgwick Howlett June 2016 THE RISE OF CHINA’S HACKING CULTURE DEFINING CHINESE HACKERS A Thesis Presented to the Faculty of California State University, San Bernardino by William Sedgwick Howlett June 2016 Approved by: Cherstin Lyon, Committee Chair, Social Sciences and Globalization Jeremy Murray, Committee Member, History Jose Munoz, Committee Member, Sociology © 2016 William Sedgwick Howlett ABSTRACT China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. -
A Temperate Alternative to Cyber Insecurity
Authorized Investigation: A Temperate Alternative to Cyber Insecurity Casey M. Bruner* “Wage war honorably. You may be obliged to wage war but not to use poison arrows.”1 -Baltasar Gracián I. INTRODUCTION In 2011, “Operation Shady RAT” became universally known as one of the most widespread and pervasive cyber espionage campaigns ever discovered.2 The security breach, which persisted over a five-year period, infected more than seventy organizations worldwide including: federal and state government entities, high-tech and communications businesses, thirteen different national defense contractors, and the International Olympic Committee, among others.3 The Operation Shady RAT vulner- ability promulgated the way most computer viruses do: through an email and an attachment.4 An employee of one of the infected defense contrac- tors received an email with an Excel file attached.5 The file contained a * Casey Bruner is a J.D. Candidate at Seattle University School of Law. He previously served as Project Manager for the National Bureau of Asian Research (NBR) and for the Commission on the Theft of American Intellectual Property (IP Commission). The views, opinions, and policy recom- mendations contained in this paper are his alone and do not necessarily reflect the views of NBR, the IP Commission, or any other organization. 1. BALTASAR GRACIÁN, THE ART OF WORLDLY WISDOM 67 (Joseph Jacobs trans., Dover Publications 2005) (1653). 2. See DMITRI ALPEROVITCH, MCAFEE, REVEALED: OPERATIONS SHADY RAT (2011), http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf; see also WILLIAM C. HANNAS ET AL., CHINESE INDUSTRIAL ESPIONAGE: TECHNOLOGY ACQUISITION AND MILITARY MODERNIZATION 220 (2013) (stating that some experts believe that the “Shady RAT” vulnerability originated in China). -
MASTER THESIS Cyber Attribution: Problem Solved?
MASTER THESIS Cyber Attribution: Problem Solved? Analyzing the Communication of Blame and Evidence for Nation-State Involvement in Cyber Operations, 1998-2018 Author: K.M. (Koen) van den Dool Student Number: S1747525 E-Mail: [email protected] Date: June 6, 2018 Word count: 20237 Supervisor: Prof. Dr. B. van den Berg Second Reader: Mr. S. Boeke Program: MSc in Crisis and Security Management Faculty of Governance and Global Affairs – Universiteit Leiden Master Thesis | K.M. van den Dool Table of Contents 1. INTRODUCTION ...................................................................................................... 4 2. THEORY: ATTRIBUTION OF CYBER OPERATIONS ...................................................... 8 2.1. Defining Cyber Operations ............................................................................ 8 2.2. Attribution in Cyberspace ............................................................................ 11 2.2.1. Identification ............................................................................................. 12 2.2.2. Response ................................................................................................. 21 2.2.3. Communication ........................................................................................ 28 3. ANALYSIS: BLAME AND EVIDENCE IN CYBER ATTRIBUTION ..................................... 31 3.1. Methodology ................................................................................................ 31 3.1.1. Case Selection ........................................................................................ -
Analysing the Feasibility of Portable Passive Detection of Advanced Persistent Threats Research Project 2
Faculty of Physics, Mathematics and Informatics Graduate School of Informatics System and Network Engineering MSc Analysing the feasibility of portable passive detection of Advanced Persistent Threats Research Project 2 Student: Supervisors: Guido Kroon Marco Davids, SIDN [email protected] Christian Hesselman, SIDN August 26, 2016 Abstract The Foundation for Internet Domain Registration Netherlands (SIDN) expressed their interest in re- searching the feasibility of portable passive detection of Advanced Persistent Threat (APT). An APT is a highly sophisticated threat that high-profile organisations and governments need to arm themselves against. This request of SIDN has been defined in a project proposal, which includes the following re- search question: Can a portable passive Advanced Persistent Threat (APT) sensor be designed for easy deployment on the network and to detect the presence of potential APTs? To determine the feasibility of such a sensor required a study on how APTs execute their attacks and what their characteristics are. It also required to research which detection methods are currently being used and what current research developments propose new ways of detection. Based on researched information and analysis it can be determined that APTs are not only technically advanced, but are of an entirely different magnitude, compared with existing traditional threats. These threats operate differently and are not a mere continuation of traditional threats. It follows that current detection mechanisms are no longer sufficient, as they were designed to detect threats of a different magnitude. This created the need for new detection mechanisms that are designed to detect these threats based on their typical characteristics. -
UC Irvine UC Irvine Electronic Theses and Dissertations
UC Irvine UC Irvine Electronic Theses and Dissertations Title Regulating Cyber Space: An Examination of U.S.-China Relations Permalink https://escholarship.org/uc/item/9jb873k7 Author Ghazi-Tehrani, Adam Kavon Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, IRVINE Regulating Cyber Space: An Examination of U.S.-China Relations DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR IN PHILOSOPHY in Social Ecology by Adam Ghazi-Tehrani Dissertation Committee: Professor Emeritus Henry N. Pontell, Chair Professor John Dombrink Professor Elliott Currie 2016 © 2016 Adam KaVon Ghazi-Tehrani DEDICATION This dissertation is dedicated to: My dear, loVed family: my father, mother, sisters, and brother-in-law. I know I forgot birthdays, never called frequently enough, and have been generally “busy.” Hopefully, that’s all over. My extended family: the cherished aunts and uncles, cousins, and grandparents. To my grandparents, especially, I wish you could haVe seen this. My friends: Julie Gerlinger, who truly deserVes her own “thank you” page, nothing I say here could eVer be enough; Michael Ridino, my brother in arms, my fiercest companion; Tori Warwick, you’Ve supported me through thick and thin, eVen when others told you not to; Eric Parsons, Westley Nunn, Todd Gerlinger, and Tucker Biggs, I trust you each with my life, Virtual or otherwise; and Rashad Almomani, we’ve drifted apart, let’s fix that. -
Nation-State Attackers and Their Effects on Computer Security
Nation-State Attackers and their Effects on Computer Security by Andrew Springall A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in the University of Michigan 2018 Doctoral Committee: Professor J. Alex Halderman, Chair Research Professor Peter Honeyman Professor Atul Prakash Assistant Professor Florian Schaub Andrew Springall [email protected] ORCID: 0000-0001-5999-9881 ©Andrew Springall 2018 Acknowledgments This dissertation, the research inside and outside of it, and so many more things would not be possible without the support of an innumerable number of people. I first want to thank my advisor, J. Alex Halderman for everything. The guidance, encouragement, advice, and freedom he’s given me over the last five years is nothing short of miraculous. I also want to thank Peter Honeyman for his steadfast view- points and willingness to openly challenge my perspective over the years. I’d also like to thank my labmates Zakir Durumeric, Eric Wustrow, James Kasten, David Adrian, Ariana Mirian, Benjamin VanderSloot, Matthew Bernhard, Allison Mc- Donald, and Chris Dzombak for their help, willingness to put up with me, and the wonderful discussions. To Mom, the prayers and pleadings to finish high school, and later college, have gotten me here and although I dismissed them at the time, they were undoubtedly needed and welcome. To Dad. you know. To the Marines, Sol- diers, Sailors, and Airmen from Parris Island, California, Maryland, Iraq, and Afghanistan, I can credit you for the mindset and insanity needed to get me this far. To Goose, Katherine, Ariana, and Cecylia, you’ve helped me keep what little of my sanity I have left throughout all this.