To build such a complete defence, several questions must be answered. In the beginning it is crucial to know who is even targeted by the attacks and what kind of attack is used in the first hand. Further, it is to be answered how the payload was delivered and which vulnerabilities where used. By answering those questions behind the first four stages of the kill chain, we can build proactive defences instead of only reacting on attacks.
Research in the field of cybersecurity is driven by empirical data. To identify, what a real threat is, tools like honeypots (vulnerable machines), or network telescopes (unused IP addresses) are used. Usually, big attacks are planned in advance. By investigating those empirically researchers can learn something about the attacks before they are actually happening.
One general learning from analyzing cyberattacks is, that the attack resilience of machines is getting better every year. On the other hand, the speed attacks are conducted with also gets faster. In fact, the attack speed grows faster than the attack resilience, leaving the attackers an advantage over the defenders.
Another advantage the attackers gain is due to their global distribution of IP addresses and hosts. Most defending mechanism block attacks from the same IP address or subnet. But good adversaries invest in the costs and complexity of distributing multiple hosts and IP addresses globally and synchronize them for a single attack. Therefore, current IPS does not handle the attacks of more ambitious attackers with lots of resources. Attacks from those actors are also referred to as APT (Advanced Persistent Threats). Because of the distribution of resources over space, they can afford to also distribute their attacks over time. The research challenge in defending against these kinds of attackers is in developing algorithms that can identify unspecific patterns across an unspecific number of hosts. One possible solution is to fingerprint the software or the tooling the attackers use and reuse on all their machines. This is a scalable and efficient operation on hard- and software and real implementations showed that many new and unknown adversaries could get identified by this procedure.
Combating Malware with Community-Driven Tarpits
Mirai Architecture:
Compared to previous bot-net architectures that leverage a few very powerful machines to conduct their ddos attacks, Mirai variants take over a lot of low compute vulnerable IoT devices to achieve capacities that overshadowed previous attacks by a factor of 4. This is done via a technique called stateless scanning.
The adversary sets up a server that scans the internet for vulnerable devices. Once a vulnerable device is found, the server logs in and installs the malware. Now the infected device starts randomly searching the internet to find other vulnerable devices. Unlike previous malware, which sequentially scans and waits for responses, Mirai uses stateless scanning. This method scans without waiting for responses, significantly speeding up the scanning process. Since a small IoT device cannot keep a list of all IP addresses it previously messaged, it recovers the IP address from a vunlerables’s device SYN ACK and can start brute forcing access. Once a vulnerable device is hacked the original IoT device reports it back to the loader which then installs the newest Mirai version on the target device.