Analysis and modelling of multi-stage attacks

被引:1
|
作者
Chamotra, Saurabh [1 ]
Barbhuiya, Ferdous Ahmed [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Cyber Secur Technol Div, Mohali, India
[2] Indian Inst Informat Technol IIIT Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Honeypot; multi-stage attacks; Attack modelling; Machine learning; Malware analysis;
D O I
10.1109/TrustCom50675.2020.00170
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Honeypots are the information system resources used for capturing and analysis of cyber attacks. High-interaction Honeypots are capable of capturing attacks in their totality and hence are an ideal choice for capturing multi-stage cyber attacks. The term multi-stage attack is an abstraction that refers to a class of cyber attacks consisting of multiple attack stages. These attack stages are executed either by malicious codes, scripts or sometimes even inbuilt system tools. In the work presented in this paper we have proposed a framework for capturing, analysis and modelling of multi-stage cyber attacks. The objective of our work is to devise an effective mechanism for the classification of multi-stage cyber attacks. The proposed framework comprise of a network of high interaction honeypots augmented with an attack analysis engine. The analysis engine performs rule based labeling of captured honeypot data. The labeling engine labels the attack data as generic events. These events are further fused to generate attack graphs. The hence generated attack graphs are used to characterize and later classify the multi-stage cyber attacks.
引用
收藏
页码:1269 / 1276
页数:8
相关论文
共 50 条
  • [1] A Collaborative Tool for Modelling Multi-stage Attacks
    Herwono, Ian
    El-Moussa, Fadi Ali
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 312 - 317
  • [2] An analysis approach for multi-stage network attacks
    Wang, YM
    Liu, ZL
    Cheng, XY
    Zhang, KJ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3949 - 3954
  • [3] Modeling and reconstruction of multi-stage attacks
    Rubinshtein, Sergey
    Puzis, Rami
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016), 2016, : 135 - 137
  • [4] Detecting Web Attacks Using Multi-Stage Log Analysis
    Moh, Melody
    Pininti, Santhosh
    Doddapaneni, Sindhusha
    Moh, Teng-Sheng
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 733 - 738
  • [5] Modelling and analysis of a multi-stage order quantity model
    Andijani, A
    PRODUCTION PLANNING & CONTROL, 1997, 8 (01) : 92 - 95
  • [6] Security Risk Analysis of Multi-Stage Attacks based on Data Criticality
    Skandylas, Charilaos
    Zhou, Luyuan
    Khakpour, Narges
    Roe, Simon
    2021 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2021), 2021, : 13 - 20
  • [7] Modelling and analysis of dynamic capacity complexity in multi-stage production
    Deif, Ahmed M.
    ElMaraghy, Hoda A.
    PRODUCTION PLANNING & CONTROL, 2009, 20 (08) : 737 - 749
  • [8] A multi-stage approach for DBD modelling
    Cristofolini, Andrea
    Popoli, Arturo
    15TH HIGH-TECH PLASMA PROCESSES CONFERENCE (HTPP15), 2019, 1243
  • [9] Modelling and analysis of multi-stage systems of mistuned bladed disks
    Laxalde, Denis
    Pierre, Christophe
    COMPUTERS & STRUCTURES, 2011, 89 (3-4) : 316 - 324
  • [10] Multi-stage production system: modelling and analysis using simulation
    Gunasekaran, A
    Goyal, SK
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 1999, 12 (2-5) : 119 - 130