With the purpose of defending against lateral movement in todays borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum. Considering a full scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorised session of the compromised endpoint can be leveraged to perform limited, though malicious activities, ultimately rendering the endpoints the Achilles heel of ZTA. To effectively detect such attacks, distributed collaborative intrusion detection systems with attack scenario-based approach have been developed. Nonetheless, Advanced Persistent Threats (APTs) have demonstrated their ability to bypass this approach with high success ratio. As a result, adversaries can pass undetected or potentially alter the detection logging mechanisms to achieve a stealthy presence. Recently, blockchain technology has demonstrated solid use cases in the cyber security domain. Motivated by the convergence of ZTA and blockchain-based intrusion detection and prevention, in this paper, we examine how ZTA can be augmented onto endpoints. Namely, we perform a systematic review of ZTA models, real-world architectures with the focus on endpoints, and blockchain-based intrusion detection systems. We discuss the potential of blockchains immutability fortifying the detection process, and the identified open challenges as well as the possible solutions and future directions.
翻译:零信任架构(ZTA)的采用随着在当今无边界网络中防范横向移动的目的而正在形成势头。考虑到全面实施ZTA,对手不太可能能够从一个受损的终点开始通过网络扩散。然而,已经认证和授权的受损端点会议,尽管恶意,但最终使ZTA的致命环节成为ZTA的致命环节。为了有效发现此类袭击,已经开发了以攻击情景为基础的分散合作入侵探测系统。然而,先进的持续威胁(APTs)表明他们有能力绕过这一方法,并且取得了很高的成功率。结果,对手能够通过不被发现或有可能改变探测记录机制,从而实现隐形的存在。最近,链式技术展示了网络安全领域的可靠使用案例。受ZTA和基于链式入侵探测和预防的结合的动力,我们在本文中研究了ZTA如何在终端上扩大合作入侵探测系统。我们系统地审查了ZTA模型、真实的检测流程以及未来链式系统的潜在挑战。我们作为安全链式检测系统,以最终的焦点,对安全链式检测系统进行了系统进行系统性审查,并讨论。