Home > Research > Publications & Outputs > Citrus

Electronic data

Text available via DOI:

View graph of relations

Citrus: Orchestrating Security Mechanisms via Adversarial Deception

Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Published

Standard

Citrus: Orchestrating Security Mechanisms via Adversarial Deception. / Mills, Ryan; Broadbent, Matthew; Race, Nicholas.
2020. Poster session presented at 6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual), Budapest, Hungary.

Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Harvard

Mills, R, Broadbent, M & Race, N 2020, 'Citrus: Orchestrating Security Mechanisms via Adversarial Deception', 6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual), Budapest, Hungary, 24/04/20 - 24/04/20. https://doi.org/10.1109/NOMS47738.2020.9110443

APA

Mills, R., Broadbent, M., & Race, N. (2020). Citrus: Orchestrating Security Mechanisms via Adversarial Deception. Poster session presented at 6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual), Budapest, Hungary. https://doi.org/10.1109/NOMS47738.2020.9110443

Vancouver

Mills R, Broadbent M, Race N. Citrus: Orchestrating Security Mechanisms via Adversarial Deception. 2020. Poster session presented at 6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual), Budapest, Hungary. doi: https://doi.org/10.1109/NOMS47738.2020.9110443

Author

Mills, Ryan ; Broadbent, Matthew ; Race, Nicholas. / Citrus : Orchestrating Security Mechanisms via Adversarial Deception. Poster session presented at 6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual), Budapest, Hungary.4 p.

Bibtex

@conference{723c5064ed0b48f18efec725fc33aac2,
title = "Citrus: Orchestrating Security Mechanisms via Adversarial Deception",
abstract = "Despite the Internet being an apex of human achievement for many years, sophisticated targeted attacks are becoming more prevalent than ever before. Large scale data collection using threat sources such as honeypots have recently been employed to gather information relating to these attacks. While this data naturally details attack properties, there exists challenges in extracting the relevant information from vast data sets to provide valuable insight and a standard description of the attack.Traditionally, threats are identified through the use of signatures that are crafted manually through the composition of IOCs (Indicators of Compromise) extracted from telemetry captured during an attack process, which is often administered by an experienced engineer. These signatures have been proven effective in their use by IDSs (Intrusion Detection Systems) to detect emerging threats. However, little research has been made in automating the extraction of emerging IOCs and the generation of corresponding signatures which incorporate host artefacts.In this paper we present Citrus: a novel approach to the generation of signatures by incorporating host based telemetry extracted from honeypot endpoints. Leveraging this visibility at an endpoint grants a detailed understanding of bleeding edge attack tactics, techniques, and procedures gathered from host logs.",
author = "Ryan Mills and Matthew Broadbent and Nicholas Race",
year = "2020",
month = apr,
day = "24",
doi = "https://doi.org/10.1109/NOMS47738.2020.9110443",
language = "English",
note = "6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual), DISSECT 2020 ; Conference date: 24-04-2020 Through 24-04-2020",
url = "http://www.inf.ufrgs.br/dissect/2020/",

}

RIS

TY - CONF

T1 - Citrus

T2 - 6TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (Virtual)

AU - Mills, Ryan

AU - Broadbent, Matthew

AU - Race, Nicholas

N1 - Conference code: 6th

PY - 2020/4/24

Y1 - 2020/4/24

N2 - Despite the Internet being an apex of human achievement for many years, sophisticated targeted attacks are becoming more prevalent than ever before. Large scale data collection using threat sources such as honeypots have recently been employed to gather information relating to these attacks. While this data naturally details attack properties, there exists challenges in extracting the relevant information from vast data sets to provide valuable insight and a standard description of the attack.Traditionally, threats are identified through the use of signatures that are crafted manually through the composition of IOCs (Indicators of Compromise) extracted from telemetry captured during an attack process, which is often administered by an experienced engineer. These signatures have been proven effective in their use by IDSs (Intrusion Detection Systems) to detect emerging threats. However, little research has been made in automating the extraction of emerging IOCs and the generation of corresponding signatures which incorporate host artefacts.In this paper we present Citrus: a novel approach to the generation of signatures by incorporating host based telemetry extracted from honeypot endpoints. Leveraging this visibility at an endpoint grants a detailed understanding of bleeding edge attack tactics, techniques, and procedures gathered from host logs.

AB - Despite the Internet being an apex of human achievement for many years, sophisticated targeted attacks are becoming more prevalent than ever before. Large scale data collection using threat sources such as honeypots have recently been employed to gather information relating to these attacks. While this data naturally details attack properties, there exists challenges in extracting the relevant information from vast data sets to provide valuable insight and a standard description of the attack.Traditionally, threats are identified through the use of signatures that are crafted manually through the composition of IOCs (Indicators of Compromise) extracted from telemetry captured during an attack process, which is often administered by an experienced engineer. These signatures have been proven effective in their use by IDSs (Intrusion Detection Systems) to detect emerging threats. However, little research has been made in automating the extraction of emerging IOCs and the generation of corresponding signatures which incorporate host artefacts.In this paper we present Citrus: a novel approach to the generation of signatures by incorporating host based telemetry extracted from honeypot endpoints. Leveraging this visibility at an endpoint grants a detailed understanding of bleeding edge attack tactics, techniques, and procedures gathered from host logs.

U2 - https://doi.org/10.1109/NOMS47738.2020.9110443

DO - https://doi.org/10.1109/NOMS47738.2020.9110443

M3 - Poster

Y2 - 24 April 2020 through 24 April 2020

ER -