Data exfiltration is of increasing concern throughout the world. The number of incidents and capabilities of data exfiltration attacks are growing at an unprecedented rate. However, such attack vectors have not been deeply explored in the literature. This paper aims to address this gap by implementing a data exfiltration methodology, detailing some data exfiltration methods. Groups of exfiltration methods are incorporated into a program that can act as a testbed for owners of any network that stores sensitive data. The implemented methods are tested against the well-known network intrusion detection system Snort, where all of them have been successfully evaded detection by its community rule sets. Thus, in this paper, we have developed new countermeasures to prevent and detect data exfiltration attempts using these methods.
|Title of host publication||2021 IEEE International Conference on Cyber Security and Resilience (CSR)|
|Publication status||Published - 6 Sep 2021|
|Event||2021 IEEE International Conference on Cyber Security and Resilience - Virtual|
Duration: 26 Jul 2021 → 28 Jul 2021
|Conference||2021 IEEE International Conference on Cyber Security and Resilience|
|Abbreviated title||IEEE CSR|
|Period||26/07/21 → 28/07/21|