Analysis and modelling of multi-stage attacks

被引:1
|
作者
Chamotra, Saurabh [1 ]
Barbhuiya, Ferdous Ahmed [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Cyber Secur Technol Div, Mohali, India
[2] Indian Inst Informat Technol IIIT Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Honeypot; multi-stage attacks; Attack modelling; Machine learning; Malware analysis;
D O I
10.1109/TrustCom50675.2020.00170
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Honeypots are the information system resources used for capturing and analysis of cyber attacks. High-interaction Honeypots are capable of capturing attacks in their totality and hence are an ideal choice for capturing multi-stage cyber attacks. The term multi-stage attack is an abstraction that refers to a class of cyber attacks consisting of multiple attack stages. These attack stages are executed either by malicious codes, scripts or sometimes even inbuilt system tools. In the work presented in this paper we have proposed a framework for capturing, analysis and modelling of multi-stage cyber attacks. The objective of our work is to devise an effective mechanism for the classification of multi-stage cyber attacks. The proposed framework comprise of a network of high interaction honeypots augmented with an attack analysis engine. The analysis engine performs rule based labeling of captured honeypot data. The labeling engine labels the attack data as generic events. These events are further fused to generate attack graphs. The hence generated attack graphs are used to characterize and later classify the multi-stage cyber attacks.
引用
收藏
页码:1269 / 1276
页数:8
相关论文
共 50 条
  • [21] Numerical modelling of a multi-stage solar still
    Jubran, BA
    Ahmed, MI
    Ismail, AF
    Abakar, YA
    ENERGY CONVERSION AND MANAGEMENT, 2000, 41 (11) : 1107 - 1121
  • [22] Modelling multi-stage processes through multivariate distributions
    SenGupta, A
    Ugwuowo, FI
    JOURNAL OF APPLIED STATISTICS, 2006, 33 (02) : 175 - 187
  • [23] Modelling of multi-stage production lines with maintenance operations
    Savsar, M.
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2008, 21 (04) : 396 - 406
  • [24] Mathematical modelling of the impacts of syphilis multi-stage treatments
    Olopade, Isaac
    Ajao, Saheed
    Akinwumi, Titilayo
    Adeniran, Gbenga
    Aderenle, Raphael
    Adesanya, Adelani
    MODELING EARTH SYSTEMS AND ENVIRONMENT, 2024, 10 (04) : 5489 - 5502
  • [25] Modelling robustness in serial multi-stage manufacturing processes
    Mondal, S. C.
    Maiti, J.
    Ray, P. K.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2013, 51 (21) : 6359 - 6377
  • [26] Modelling multi-stage manufacturing systems for efficient scheduling
    Charalambous, C
    Tahmassebi, T
    Hindi, K
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2000, 122 (02) : 329 - 338
  • [27] Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks
    Chadza, Timothy
    Kyriakopoulos, Konstantinos G.
    Lambotharan, Sangarapillai
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 (108): : 636 - 649
  • [28] Multi-stage optimal component analysis
    Wu, Yiming
    Liu, Xiuwen
    Mio, Washington
    2007 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-6, 2007, : 2544 - +
  • [29] Cyber-attacks visualisation and prediction in complex multi-stage network
    Mishra, Shailendra
    Alotaibi, Waleed Bander
    Alshehri, Mohammed
    Saxena, Sharad
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (04) : 345 - 356
  • [30] A formal and automated approach to exploiting multi-stage attacks of web applications
    Meo, Federico De
    Vigano, Luca
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (05) : 525 - 576