Pivot Attack Classification for Cyber Threat Intelligence

نویسندگان

چکیده

The initial access achieved by cyber adversaries conducting a systematic attack against targeted network is unlikely to be an asset of interest. Therefore, it necessary use lateral movement techniques expand different devices within the accomplish strategic attack’s objectives. pivot technique widely used in this context; attacker creates indirect communication tunnel with target and uses traffic forwarding methods send receive commands. Recognising classifying large corporate networks complex task, due number events generated. In paper, we present classification criteria based on perceived indicators (IoA) identify level connectivity adversary. Additionally, automatic classifier algorithm proposed include attribute introduce novel capability for APIVADS detection scheme. new includes differentiate between types attacks contribute threat intelligence capabilities regarding adversary modus operandi. To best our knowledge, first academic peer-reviewed study providing criteria.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...

متن کامل

Data-driven analytics for cyber-threat intelligence and information sharing

particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...

متن کامل

Cyber Threat Intelligence for Supporting the ATM Security Management

This paper presents the recent research advances in ATM (Air Traffic Management) industry showcasing the solution envisaged for the GAMMA Project and demonstrating how the cyber threat intelligence is used to support ATM security management.

متن کامل

Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection

Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the developme...

متن کامل

Threat Analysis of Cyber Attacks with Attack Tree+

Defenders have developed various threat risk analysis schemes to recognize the intruder attack profile, identify the system weakness, and implement the security safeguards to protect the information asset from cyber-attacks. Attack trees (AT) technique play an important role to investigate the threat analysis problem to known cyber-attacks for risk assessment. For example, protection trees and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security and Cybercrimes Research

سال: 2022

ISSN: ['1658-7782', '1658-7790']

DOI: https://doi.org/10.26735/zntl3639