timeconsumingandproblematicifsucienttrackingisntinplacethusitisimperativethatindicatorssubjecttotheseprocessesarevalidandapplicabletotheproblemsetinquestionIfattentionisnotpaidtothispointanalyst ID: 300862
Download Pdf The PPT/PDF document "ComputerEmergencyResponseTeam(US-CERT)is..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
ComputerEmergencyResponseTeam(US-CERT)issuedtechnicalalertbulletinsdescribingtargeted,socially-engineeredemailsdroppingtrojanstoexltratesensitiveinformation.Theseintrusionswereoverasignicantperiodoftime,evadedconventionalrewallandanti-viruscapabilities,andenabledadversariestoharvestsensitiveinformation(UK-NISCC,2005;US-CERT,2005).EpsteinandElgin(2008)ofBusinessWeekdescribednumerousintrusionsintoNASAandothergovernmentnetworkswhereAPTactorswereundetectedandsuccessfulinremovingsensitivehigh-performancerocketdesigninformation.InFebruary2010,iSecPartnersnotedthatcurrentapproachessuchasanti-virusandpatchingarenotsucient,endusersaredirectlytargeted,andthreatactorsareaftersensitiveintellectualproperty(Stamos,2010).BeforetheU.S.HouseArmedServicesCommitteeSubcommitteeonTerrorism,UnconventionalThreatsandCapabilities,JamesAndrewLewisoftheCenterforStrategicandInternationalStudiestestiedthatintrusionsoccurredatvariousgovernmentagenciesin2007,includingtheDepartmentofDefense,StateDepartmentandCommerceDepartment,withtheintentionofinformationcollection(Lewis,2008).WithspecicityaboutthenatureofcomputernetworkoperationsreportedlyemanatingfromChina,the2008and2009reportstoCongressoftheU.S.-ChinaEconomicandSecurityReviewCommissionsummarizedreportingoftargetedintrusionsagainstU.S.military,governmentandcontractorsystems.Again,adversariesweremotivatedbyadesiretocollectsensitiveinformation(U.S.-ChinaEconomicandSecurityReviewCommission,2008,2009).Finally,areportpreparedfortheU.S.-ChinaEconomicandSecurityReviewCommission,Krekel(2009)prolesanadvancedintrusionwithextensivedetaildemonstratingthepatienceandcalculatednatureofAPT.Advancesininfrastructuremanagementtoolshaveenabledbestpracticesofenterprise-widepatchingandhardening,reducingthemosteasilyaccessiblevulnerabilitiesinnetworkedservices.YetAPTactorscontinuallydemonstratethecapabilitytocompromisesystemsbyusingadvancedtools,customizedmalware,and\zero-day"exploitsthatanti-virusandpatchingcannotdetectormitigate.ResponsestoAPTintrusionsrequireanevolutioninanalysis,process,andtechnology;itispossibletoanticipateandmitigatefutureintrusionsbasedonknowledgeofthethreat.Thispaperdescribesanintelligence-driven,threat-focusedapproachtostudyintrusionsfromtheadversaries'perspective.Eachdiscretephaseoftheintrusionismappedtocoursesofactionfordetection,mitigationandresponse.Thephrase\killchain"describesthestructureoftheintrusion,andthecorrespondingmodelguidesanalysistoinformactionablesecurityintelligence.Throughthismodel,defenderscandevelopresilientmitigationsagainstintrudersandintelligentlyprioritizeinvestmentsinnewtechnologyorprocesses.Killchainanalysisillustratesthattheadversarymustprogresssuccessfullythrougheachstageofthechainbeforeitcanachieveitsdesiredobjective;justonemitigationdisruptsthechainandtheadversary.Throughintelligence-drivenresponse,thedefendercanachieveanadvantageovertheaggressorforAPTcaliberadversaries.Thispaperisorganizedasfollows:sectiontwoofthispaperdocumentsrelatedworkonphasebasedmodelsofdefenseandcountermeasurestrategy.Sectionthreeintroducesanintelligence-drivencomputernetworkdefensemodel(CND)thatincorporatesthreat-specicintrusionanalysisanddefensivemitigations.Sectionfourpresentsanapplicationofthisnewmodeltoarealcasestudy,andsectionvesummarizesthepaperandpresentssomethoughtsonfuturestudy.2RelatedWorkWhilethemodelingofAPTsandcorrespondingresponseusingkillchainsisunique,otherphasebasedmodelstodefensiveandcountermeasurestrategiesexist.AUnitedStatesDepartmentofDefenseJointStapublicationdescribesakillchainwithstagesnd,x,track,target,engage,andassess(U.S.DepartmentofDefense,2007).TheUnitedStatesAirForce(USAF)hasusedthisframeworktoidentifygapsinIntelligence,SurveillanceandReconnaissance(ISR)capabilityandtoprioritizethedevelopmentofneededsystems(Tirpak,2000).ThreatchainshavealsobeenusedtomodelImprovisedExplosiveDevice(IED)attacks(NationalResearchCouncil,2007).TheIEDdeliverychainmodelseverythingfromadversaryfundingtoattackexecution.CoordinatedintelligenceanddefensiveeortsfocusedoneachstageoftheIEDthreatchainastheidealwaytocountertheseattacks.Thisapproachalsoprovidesamodelforidenticationofbasicresearchneedsbymappingexistingcapabilitytothechain.Phasebasedmodelshavealsobeenusedforantiterrorismplanning.TheUnitedStatesArmydescribestheterroristoperationalplanningcycleasasevenstepprocessthatservesasabaselinetoassesstheintentandcapabilityofterroristorganizations(UnitedStatesArmyTraining2 time-consumingandproblematicifsucienttrackingisn'tinplace,thusitisimperativethatindicatorssubjecttotheseprocessesarevalidandapplicabletotheproblemsetinquestion.Ifattentionisnotpaidtothispoint,analystsmayndthemselvesapplyingthesetechniquestothreatactorsforwhichtheywerenotdesigned,ortobenignactivityaltogether. Figure1:Indicatorlifecyclestatesandtransitions3.2IntrusionKillChainAkillchainisasystematicprocesstotargetandengageanadversarytocreatedesiredeects.U.S.militarytargetingdoctrinedenesthestepsofthisprocessasnd,x,track,target,engage,assess(F2T2EA):ndadversarytargetssuitableforengagement;xtheirlocation;trackandobserve;targetwithsuitableweaponorassettocreatedesiredeects;engageadversary;assesseects(U.S.DepartmentofDefense,2007).Thisisanintegrated,end-to-endprocessdescribedasa\chain"becauseanyonedeciencywillinterrupttheentireprocess.Expandingonthisconcept,thispaperpresentsanewkillchainmodel,onespecicallyforintrusions.Theessenceofanintrusionisthattheaggressormustdevelopapayloadtobreachatrustedboundary,establishapresenceinsideatrustedenvironment,andfromthatpresence,takeactionstowardstheirobjectives,betheymovinglaterallyinsidetheenvironmentorviolatingthecondentiality,integrity,oravailabilityofasystemintheenvironment.Theintrusionkillchainisdenedasreconnaissance,weaponization,delivery,exploitation,installation,commandandcontrol(C2),andactionsonobjectives.Withrespecttocomputernetworkattack(CNA)orcomputernetworkespionage(CNE),thedenitionsforthesekillchainphasesareasfollows:1.Reconnaissance-Research,identicationandselectionoftargets,oftenrepresentedascrawlingInternetwebsitessuchasconferenceproceedingsandmailinglistsforemailaddresses,socialrelationships,orinformationonspecictechnologies.2.Weaponization-Couplingaremoteaccesstrojanwithanexploitintoadeliverablepayload,typicallybymeansofanautomatedtool(weaponizer).Increasingly,clientapplicationdatalessuchasAdobePortableDocumentFormat(PDF)orMicrosoftOcedocumentsserveastheweaponizeddeliverable.3.Delivery-Transmissionoftheweapontothetargetedenvironment.ThethreemostprevalentdeliveryvectorsforweaponizedpayloadsbyAPTactors,asobservedbytheLockheedMartinComputerIncidentResponseTeam(LM-CIRT)fortheyears2004-2010,areemailattachments,websites,andUSBremovablemedia.4.Exploitation-Aftertheweaponisdeliveredtovictimhost,exploitationtriggersintruders'code.Mostoften,exploitationtargetsanapplicationoroperatingsystemvulnerability,butitcouldalsomoresimplyexploittheusersthemselvesorleverageanoperatingsystemfeaturethatauto-executescode.4 Table2:IntrusionAttempt1Indicators 4.2IntrusionAttempt2Onedaylater,anotherTMEintrusionattemptwasexecuted.Analystswouldidentifysubstantiallysimilarcharacteristicsandlinkthisandthepreviousday'sattempttoacommoncampaign,butanalystsalsonotedanumberofdierences.Therepeatedcharacteristicsenableddefenderstoblockthisactivity,whilethenewcharacteristicsprovidedanalystsadditionalintelligencetobuildresiliencywithfurtherdetectionandmitigationcoursesofaction.Received:(qmail97721invokedbyuid60001);4Mar200914:35:22-0000Message-ID:唦 .9;版.qm@;web5;㐑.mai;l.re;.ya;hoo.;om0;Received:from[216.abc.xyz.76]byweb53411.mail.re2.yahoo.comviaHTTP;Wed,04Mar200906:35:20PSTX-Mailer:YahooMailWebService/0.7.289.1Date:Wed,4Mar200906:35:20-0800(PST)From:AnneE... n..;.ett;o@ya;hoo.;om0;Reply-To:dn...etto@yahoo.comSubject:7thAnnualU.S.MissileDefenseConferenceTo:[REDACTED]MIME-Version:1.0Content-Type:multipart/mixed;boundary="0-760892832-1236177320=:97248"Welcometothe7thAnnualU.S.MissileDefenseConferenceThesendingemailaddresswascommontoboththeMarch3andMarch4activity,butthesubjectmatter,recipientlist,attachmentname,andmostimportantly,thedownstreamIPaddress(216.abc.xyz.76)dif-fered.AnalysisoftheattachedPDF,MDA_Prelim_2.pdf,revealedanidenticalweaponizationencryptionalgorithmandkey,aswellasidenticalshellcodetoexploitthesamevulnerability.ThePEinstallerinthePDFwasidenticaltothatusedthepreviousday,andthebenignPDFwasonceagainanidenticalcopyofaleonAIAA'swebsite(http://www.aiaa.org/events/missiledefense/MDA_Prelim_09.pdf).Theadversarynevertookactionstowardsitsobjectives,thereforethatphaseisagainmarked"N/A."AsummaryofindicatorsfromthersttwointrusionattemptsisprovidedinTable3.10 U.S.-ChinaEconomicandSecurityReviewCommission.2009ReporttoCongressoftheU.S.-ChinaEconomicandSecurityReviewCommission,November2009.URLhttp://www.uscc.gov/annual_report/2009/annual_report_full_09.pdf.U.S.DepartmentofDefense.JointPublication3-13InformationOperations,February2006.URLhttp://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf.U.S.DepartmentofDefense.JointPublication3-60JointTargeting,April2007.URLhttp://www.dtic.mil/doctrine/new_pubs/jp3_60.pdf.RobertWillisonandMikkoSiponen.Overcomingtheinsider:reducingemployeecomputercrimethroughSituationalCrimePrevention.CommunicationsoftheACM,52(9):133{137,2009.doi:http://doi.acm.org/10.1145/1562164.1562198.14