Self-propagating malware (SPM) has led to huge financial losses, major data breaches, and widespread service disruptions in recent years. In this paper, we explore the problem of developing cyber resilient systems capable of mitigating the spread of SPM attacks. We begin with an in-depth study of a well-known self-propagating malware, WannaCry, and present a compartmental model called SIIDR that accurately captures the behavior observed in real-world attack traces. Next, we investigate ten cyber defense techniques, including existing edge and node hardening strategies, as well as newly developed methods based on reconfiguring network communication (NodeSplit) and isolating communities. We evaluate all defense strategies in detail using six real-world communication graphs collected from a large retail network and compare their performance across a wide range of attacks and network topologies. We show that several of these defenses are able to efficiently reduce the spread of SPM attacks modeled with SIIDR. For instance, given a strong attack that infects 97% of nodes when no defense is employed, strategically securing a small number of nodes (0.08%) reduces the infection footprint in one of the networks down to 1%.
翻译:自我宣传的恶意软件(SPM)近年来已导致巨大的财政损失、重大数据破坏和广泛的服务中断。 在本文中,我们探讨了开发能够减缓SPM攻击扩散的网络抗御系统的问题。我们首先深入研究了众所周知的自我宣传的恶意软件(WanCry),并提出了一个称为SIIDR的条块模型,准确记录了在现实世界攻击痕迹中观察到的行为。接下来,我们调查了10种网络防御技术,包括现有的边际和节点硬化战略,以及基于重组网络通信(NodeSplit)和隔离社区的新开发的方法。我们利用从大型零售网络收集的6个真实世界通信图详细评估所有防御战略,并比较其在广泛的攻击和网络结构学上的表现。我们显示,其中若干种防御能够有效地减少SIIDR模型所模拟的SPM攻击的蔓延。 例如,在没有使用防御时,大量攻击会影响97%的节点,从战略角度上保证了1个节点网络中的少量节点(0.08%)的足迹。