Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context

RESEARCH CREW
6:34 24/11/2022

In large-scale networks like the Industrial Internet of Things (IIoT), it is more important to monitor and enforce the security policy within an appropriate time due to the continuous widespread of cyberattacks. This is a tough challenge in traditional network architecture; thus, each network element's network management is unsuitable for a dynamic network with diverse types of devices in IIoT. In this context, Software-Defined Networking (SDN) is considered as enabling technology for flexible network management through programmability from a centralized controller. This work performs an experimental study on applying Cyber Threat Intelligence (CTI) to consecutively update the signatures of malicious actors from threat-hunting organizations to prepare the network defense strategy for IIoT networks. Such intelligence of network defenders from CTI is used as indicators to uncover the presence of malicious actors in the network. They are promptly transformed to security flow rules by the OpenFlow application through the SDN controller. The experimental results on the SDN environment show that this approach can help automatically generate and enforce security policy to protect the large-scale network against adversaries efficiently.

TIN LIÊN QUAN
The advancement of software vulnerability detection tools has accelerated in recent years, yet the prevalence and severity of vulnerabilities continue to escalate, posing significant threats to computer security and information safety. To address this, numerous detection methodologies have been proposed, with machine learning-based approaches demonstrating notable promise. In this paper,...
Detecting malware on Android remains a major challenge because malicious apps use sophisticated evasion techniques. This study presents RAX-ClaMal, a novel approach leveraging dynamic analysis of RAX (Register a Extended) register values for Android malware detection. By extracting and examining the RAX register in the data sections from Dalvik Executable...