Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    Detecting the Unknown Unknowns in Cybersecurity

    Along with your current network protection system, consider adding passive network monitoring along with honey tokens to block unexpected cyber threats.

    By
    eWEEK EDITORS
    -
    March 8, 2022
    Share
    Facebook
    Twitter
    Linkedin
      data privacy

      In 2002, Donald Rumsfeld, then the United States Secretary of Defense, said “Reports that say that something hasn’t happened are always interesting to me, because as we know, there are known knowns; there are things we know we know.”

      However, he added “there are also unknown unknowns – the ones we don’t know we don’t know. And if one looks throughout the history of our country and other free countries, it is the latter category that tends to be the difficult ones.”

      The same lack of knowledge is true in the cybersecurity world. Let’s take a look.

      Also see: Secure Access Service Edge: Big Benefits, Big Challenges

      Cyber Threats: A Short History

      The very first type of cyber threat was the notorious virus. It was an innovative computer program that could create copies of itself and “jump” from one computer to the next. Back then, attackers used floppy disks, but as time went on, they began to use computer networks and the Internet.

      The first anti-virus software created databases of signatures; parts of the binary code that included lots of different such viruses and compared each file on the system against that database. Back then, that strategy was enough because developing applications was complex and, more important, time-consuming, specifically using languages such as C/C++/Assembly.

      Since then, dynamic languages such as Python have appeared that facilitate the software development process by allowing users to more easily collaborate and re-use code parts. This, together with the rise of cryptocurrency, increased the attackers’ motivation and made the usage of such signature databases infeasible. The number of such known signatures and the rate at which this list is growing are simply staggering.

      Many security solutions, even today, are still trying to use various types of signatures to detect malicious files, network traffic, human behaviors, and several others. Even tools that are trying to harness the immense power of large user communities to create vast databases of tens of thousands of different signatures are only effective to some extent. Overall, this strategy is not enough to provide good protection against the known threats.

      And even if it was effective in protecting against known threats, it still won’t provide any protection against the known unknowns – and certainly not against the unknown unknowns. These attack types are being conceived and developed by attackers somewhere right now.

      Also see: Tech Predictions for 2022: Cloud, Data, Cybersecurity, AI and More

      The Struggle to Block Unknown Threats

      As mentioned, the signature-based defense tactic in which we create vast databases of IOCs (Indications of Compromise – e.g., IPs, domain names, users) is becoming less and less effective today with the rise of new computer languages.

      Another trend that makes this approach less effective is the use of DGAs, Domain Generation Algorithms. Using this technique, the attacker embeds a piece of code inside the malware that uses variables known to the attacker and malware (for example, the current date), that will periodically and dynamically create a domain name and access it.

      If it succeeds, it will be used, and if not, it will revert to the most recently used domain name that did work. Such techniques render signatures based on domain names and IPs essentially useless as these can easily be changed by the attacker at any time.

      Another technique we see includes several types of network segmentation and segregation. This method spills the network into several sub-networks via various kinds of firewalls. Then, access to the Internet is not achieved directly but rather via a proxy or some sort of a terminal server, which receives keystrokes and mouse movements and returns images (i.e. screenshots).

      This can effectively protect against certain types of threats but does not guard the organization against all types of attacks. Furthermore, such methods don’t provide the organization with any tools that help detect attacks or use evasion mechanisms against these devices or services. And they don’t improve the organization’s observability overall.

      Another technique that is very effective but rarely used for practical reasons is whitelisting. Using this method, the organization will create and maintain databases of signatures of allowed executables, websites, certificate issuers, file hashes, etc. The downside is apparent: the amount of data the organization needs to collect and the manual maintenance required renders such a solution infeasible for most organizations.

      Combining Technologies to Block Threats

      As in many other cases in technology, when confronted with the need to choose between two options, the best path forward is – usually – to combine the two while getting the pros of both options and minimizing the cons.

      The same is valid here. It’s recommended that you maintain, and continue improving, your current network segregation and firewalls. But add to it a passive network monitoring solution that will continuously monitor the traffic between computers on the organization’s local network and the traffic between the organization and the outside world. Also, usage of what is known as honey tokens can help tremendously in improving the detection capabilities of the passive monitoring solution.

      Then, using the data collected from all these solutions, you can create alerts that fire whenever a new value appears in selected fields – in selected events – that would be a good indication of malicious activity.

      These fields will include:

      • Destination and source countries
      • Processes launched by the root/Administrator user
      • External DNS servers accessed by internal machines that are not the internal DNS server
      • RDP/VNC users
      • SSH server applications
      • Application types
      • Internally hosted services consumed by external hosts

      We still may not be able to block all the “unknown unknowns” but we would at least be combing the best technologies we have right now.

      Also see: The Successful CISO: How to Build Stakeholder Trust

      About the Author:

      Yuval Khalifa, Security Solutions Architect, Coralogix

      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×