|
Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including “the old magic bullet,” the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate.
One very promising line of thinking is that of active defense. While the concept is often attributed to some recent action, active defense has been one form of warfare for many centuries; there are instances of what might be called active defense outlined in the Bible and in Greek histories. But it is only recently, in light of the many wars around Israel, that defense in depth has taken on its modern shape in active defense. What about active defense is so interesting from a network security perspective? It is primarily this: in active defense, the defender seeks to tire an attacker out by remaining mobile, misdirecting the attacker, and using every opportunity to learn about the attacker’s techniques, aims, and resources to reflect these back on the attacker.
This is not the same as hacking back, which tries to use the attackers’ tools against them; often hacking back is actually illegal and unethical, as it can easily harm innocent bystanders. Hacking back also opens up a new set of attack vectors; if someone can make you react to an attack by attacking a third party, the consequences would be far worse than having done nothing at all.
So what does active defense consists of in the world of network security? Georgetown University undertook a study of how to apply active defense to cyber security, and issued a report called Out of the Gray Zone detailing the results. They identified eleven steps, seven of which are considered low risk —
Source: Into the Gray Zone: Active Defense by the Private Sector against Cyber Threats
The five higher risk steps, such as intelligence gathering and botnet takedowns, are reserved in the paper for use “in cooperation with government authorities.” Some of these mechanisms should be reserved for use after some local authority has been notified, and has given legal clearance to move forward. Some of them (such as sanctions and indictments) would require moving through legal processes either in the law enforcement or political realms.
This is just a short overview of the paper, of course—the entire report is well worth reading, as it should spur your thinking about what active defense might look like in your network.
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign