skip to main content
article
Open Access

Cyber reconnaissance techniques

Published:22 February 2021Publication History
Skip Editorial Notes Section

Editorial Notes

The authors have requested minor, non-substantive changes to the VoR and, in accordance with ACM policies, a Corrected VoR was published on May 27, 2021. For reference purposes the VoR may still be accessed via the Supplemental Material section on this page.

Skip Abstract Section

Abstract

The evolution of and countermeasures for …

Skip Supplemental Material Section

Supplemental Material

References

  1. Achleitner, S., La Porta, T., McDaniel, P., Sugrim, S., Krishnamurthy, S.V., Chadha, R. Cyber deception: Virtual networks to defend insider reconnaissance. In Proceedings of the 8th ACM CCS Intern. Workshop on Managing Insider Security Threats, Oct. 2016, 57--68.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Al-Saleh, M. Crandall, J.R. Application-level reconnaissance: Timing channel attacks against antivirus software. In Proceedings of the 4th USENIX Conf. Large-scale Exploits and Emergent Threats, 2011, 1--8.Google ScholarGoogle Scholar
  3. Aviv, A., Gibson, K., Mossop, E., Blaze, M., Smith, J.M. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX Conf. on Offensive Technologies, 2010, 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., Sporleder, C. Acoustic side-channel attacks on printers. In Proceedings of the USENIX Security Symposium, 2010, 307--322.Google ScholarGoogle Scholar
  5. Bazm, M., M. Lacoste, M., M. Südholt, M. and J. Menaud, J. Side-channels beyond the cloud edge: New isolation threats and solutions. In Proceedings of the 1st Cyber Security in Networking Conf., Oct. 2017, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bejtlich, R. The Tao of Network Security Monitoring Beyond Intrusion Detection. Pearson Education, 2004, ISBN: 0-321-24677-2.Google ScholarGoogle Scholar
  7. Berger, Y., Wool, A. Yeredor, A. Dictionary attacks using keyboard acoustic emanations. In Proceedings of the 13th ACM Conf. Computer and Communications Security, 2006, 245--254.Google ScholarGoogle Scholar
  8. Bou-Harb, E., Debbabi, M., Assi, C. Cyber scanning: A comprehensive survey. IEEE Communications Surveys & Tutorials 16, 3 (3rdQ 2014). 1496--1519.Google ScholarGoogle ScholarCross RefCross Ref
  9. Cabaj, K., Gregorczyk, M., Mazurczyk, W., Nowakowski, P., Żórawski, P. Sniffing detection within the network: Revisiting existing and proposing novel approaches. In Proceedings of the 5G Network Security Workshop to be held jointly with the 14th Intern. Conf. on Availability, Reliability and Security, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cabana, O., Youssef, A.M., Debbabi, M., Lebel, B., Kassouf, M., Agba, B.L. Detecting, fingerprinting and tracking reconnaissance campaignst industrial control systems. Detection of Intrusions and Malware, and Vulnerability Assessment, LNCS 11543 (June 2019). R. Perdisci, C. Maurice, G. Giacinto, M. Almgren (Eds.). Springer, 89--108.Google ScholarGoogle Scholar
  11. Caviglione, L., Wendzel, S., Mazurczyk, W. The future of digital forensics: Challenges and the road ahead. IEEE Security & Privacy 15, 6, (Nov./Dec. 2017), 12--17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Caviglione, L., Coccoli, M. Privacy problems with Web 2.0. Computer Fraud & Security 10 (2011), 16--19.Google ScholarGoogle ScholarCross RefCross Ref
  13. Collins, M., Shimeall, T., Faber, S., Janies, J., Weaver R., Shon, M.D., Kadane, J. Using uncleanliness to predict future botnet addresses. In Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007, 93--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Genkin, D., Pattani, M., Schuster, R., Tromer, E. Synesthesia: Detecting screen content via remote acoustic side channels. In Proceedings of the IEEE Symp. Security & Privacy, 2019Google ScholarGoogle ScholarCross RefCross Ref
  15. Goodman, M. Future Crimes. Anchor Books, New York, 2016, ISBN 9780804171458.Google ScholarGoogle Scholar
  16. Holz, T., Gorecki, C., Rieck, K., Freiling, F. Measuring and detecting fast-flux service networks. In Proceedings of the 15th Network and Distributed System Security Symp., 2008, 257--268.Google ScholarGoogle Scholar
  17. Holz, T., Raynal, F. Detecting Honeypots and Other Suspicious Environments. In Proceedings of the 6th Annual IEEE SMC Information Assurance Workshop, 2005, 29--36.Google ScholarGoogle Scholar
  18. H2020 Project---Diversity Enhancements for Security Information and Event Management. Project Deliverable D4.1: Techniques and Tools for OSINT-based Threat Analysis; http://disiem-project.eu/wp-content/uploads/2018/06/D4.1v2.pdfGoogle ScholarGoogle Scholar
  19. Industry Week. Cyberattacks skyrocketed in 2018. Are you ready for 2019?; https://www.industryweek.com/technology-and-iiot/cyberattacks-skyrocketed-2018-are-you-ready-2019Google ScholarGoogle Scholar
  20. Kocher, P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of the Annual Intern. Cryptology Conf. Springer, Berlin, Heidelberg, 1996, 104--113.Google ScholarGoogle ScholarCross RefCross Ref
  21. Krawetz, N. Anti-honeypot technology. IEEE Security & Privacy 2, 1 (Jan-Feb 2004), 76--79.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lampson, B. A Note on the confinement problem. Commun. ACM 16, 10, (Oct. 1973), 613--615.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lancor, L., Workman, R. Using Google hacking to enhance defense strategies. ACM SIGCSE Bulletin, 2007, 491--495.Google ScholarGoogle Scholar
  24. Lei, C., Zhang, H.Q., Tan, J.L., Zhang, Y.C., Liu, X.H. Moving target defense techniques: A survey. Security and Communication Networks 2018, 1--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Li, Z., Yu, X., Wang, D., Liu, Y., Yin, H., He, S. SuperEye: A distributed port scanning system. Artificial Intelligence and Security LNCS 11635. X. Sun, Z. Pan, E. Bertino, (Eds). Springer, Cham, July 2019, 46--56.Google ScholarGoogle Scholar
  26. Lockheed Martin. The Cyber Kill Chain; https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.htmlGoogle ScholarGoogle Scholar
  27. MITRE, ATT&CK Framework; https://attack.mitre.org/Google ScholarGoogle Scholar
  28. Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R. An experimental study of security and privacy risks with emerging household appliances. In Proceedings of the IEEE Conf. on Communications and Network Security, 2014, 79--84.Google ScholarGoogle ScholarCross RefCross Ref
  29. O'Hare, J., Macfarlane, R., Lo, O. Identifying Vulnerabilities Using Internet-Wide Scanning Data. In Proceedings of the 12th IEEE Intern. Conference on Global Security, Safety and Sustainability, pp. 1--10, 2019.Google ScholarGoogle Scholar
  30. Ristenpart, T., Tromer, E., Shacham, H., Savage, S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings 16th ACM Conf. Computer and Communications Security, 2009, 199--212.Google ScholarGoogle Scholar
  31. Salahdine, F. Kaabouch, N. Social engineering attacks: A survey. Future Internet 11, 4 (2019), 1--17.Google ScholarGoogle ScholarCross RefCross Ref
  32. Sayakkara, A., N.-A. L.-K., Scanlon, M. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digital Investigation 29 (2019), 43--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Siby, S., Maiti, R.R., Tippenhauer, N.O. IoTScanner: Detecting privacy threats in IoT neighborhoods. In Proceedings of the 3rd ACM Intern. Workshop on IoT Privacy, Trust, and Security, 2017, 23--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Simon, L., Xu, W., Anderson, R. Don't interrupt me while I type: Inferring text entered through gesture typing on Android keyboards. In Proceedings of Privacy Enhancing Technologies 3 (2016), 136--154.Google ScholarGoogle ScholarCross RefCross Ref
  35. Siponen, M. A Conceptual foundation for organizational information security awareness. Information Management & Computer Security 8, 1 (2000), 31--41.Google ScholarGoogle ScholarCross RefCross Ref
  36. Trabelsi, Z. and Rahmani, H. Detection of sniffers in an Ethernet network. Information Security, LNCC 3225 (Sept. 2004). K. Zhang, Y. Zheng (Eds) Springer, Berlin, Heidelberg, 170--182,Google ScholarGoogle Scholar
  37. Trabelsi, Z., Rahmani, H., Kaouech, K., Frikha, M. Malicious sniffing systems detection platform. In Proceedings of the Intern. Symp. Applications and the Internet, 2004, 201--207.Google ScholarGoogle ScholarCross RefCross Ref
  38. Trestian, I., Ranjan, S., Kuzmanovic, A., Nucci, A. Googling the Internet: Profiling Internet endpoints via the World Wide Web. IEEE/ACM Trans. Networking 18, 2 (2010), 666--679.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Wang, P., Wu, L., Cunningham, R., Zou, C.C. Honeypot detection in advanced botnet attacks. Intern. J. Information and Computer Security 4, 1 (2010), 30--51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wang, C., Lu, Z. Cyber deception: Overview and the road ahead. IEEE Security & Privacy 16, 2 (M-A 2018), 80--85.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Cyber reconnaissance techniques

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 64, Issue 3
          March 2021
          115 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/3452024
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 February 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format