Visible to the public If Air-Gap Attacks Encounter the Mimic Defense

TitleIf Air-Gap Attacks Encounter the Mimic Defense
Publication TypeConference Paper
Year of Publication2019
AuthorsZhu, Weijun, Liu, Yichen, Fan, Yongwen, Liu, Yang, Liu, Ruitong
Conference Name2019 9th International Conference on Information Science and Technology (ICIST)
KeywordsAir gaps, air-gap attackers, air-gap attacks, Atmospheric modeling, composability, computer network security, DHR structure, dynamic heterogeneous redundancy, dynamic heterogeneous redundancy structure, Electromagnetic radiation, game theory, Hard disks, Human Behavior, human factors, Intrusion detection, malicious software, Malware, Metrics, mimic defense, network attack, pubcrawl, resilience, Resiliency, security, Transmitters
AbstractAir-gap attacks and mimic defense are two emerging techniques in the field of network attack and defense, respectively. However, direct confrontation between them has not yet appeared in the real world. Who will be the winner, if air-gap attacks encounter mimic defense? To this end, a preliminary analysis is conducted for exploring the possible the strategy space of game according to the core principles of air-gap attacks and mimic defense. On this basis, an architecture model is proposed, which combines some detectors for air-gap attacks and mimic defense devices. First, a Dynamic Heterogeneous Redundancy (DHR) structure is employed to be on guard against malicious software of air-gap attacks. Second, some detectors for air-gap attacks are used to detect some signal sent by air-gap attackers' transmitter. Third, the proposed architecture model is obtained by organizing the DHR structure and the detectors for air-gap attacks with some logical relationship. The simulated experimental results preliminarily confirm the power of the new model.
Citation Keyzhu_if_2019