With the purpose of defending against lateral movement in today's borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum. With a full scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorised session of a compromised endpoint can be leveraged to perform limited, though malicious, activities ultimately rendering the endpoints the Achilles heel of ZTA. To effectively detect such attacks, distributed collaborative intrusion detection systems with an attack scenario-based approach have been developed. Nonetheless, Advanced Persistent Threats (APTs) have demonstrated their ability to bypass this approach with a high success ratio. As a result, adversaries can pass undetected or potentially alter the detection logging mechanisms to achieve a stealthy presence. Recently, blockchain technology has demonstrated solid use cases in the cyber security domain. In this paper, motivated by the convergence of ZTA and blockchain-based intrusion detection and prevention, we examine how ZTA can be augmented onto endpoints. Namely, we perform a state-of-the-art review of ZTA models, real-world architectures with a focus on endpoints, and blockchain-based intrusion detection systems. We discuss the potential of blockchain's immutability fortifying the detection process and identify open challenges as well as potential solutions and future directions.
翻译:在当今无边界网络中,零信任架构(ZTA)的采用正随着防范横向移动的防线而形成势头。随着ZTA的全面实施,对手不太可能能够从一个妥协的终点开始通过网络扩散。然而,已经认证和授权的妥协终点会议,尽管恶意,但最终使ZTA的致命性达到极限的活动有限,最终使ZTA的致命性达到一定水平。为了有效发现这种袭击,已经开发了以攻击情景为基础的合作入侵探测系统。然而,先进的持久性威胁(ATP)已经表明他们有能力绕过这一方法,并且取得了很高的成功率。结果是,对手能够通过未探测或可能改变探测记录机制,从而实现隐形的存在。最近,链锁技术展示了网络安全领域的可靠使用案例。在ZTA和基于链的入侵探测和预防的趋同下,我们研究了ZTA如何扩大终端的终端点。我们进行了一个州级的解决方案,对ZTA系统的潜在升级的升级性,并讨论了作为安全链级探测模型的顶端点,并讨论了我们未来的安全级系统的潜在分析。