Analysis and modelling of multi-stage attacks

被引:1
|
作者
Chamotra, Saurabh [1 ]
Barbhuiya, Ferdous Ahmed [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Cyber Secur Technol Div, Mohali, India
[2] Indian Inst Informat Technol IIIT Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Honeypot; multi-stage attacks; Attack modelling; Machine learning; Malware analysis;
D O I
10.1109/TrustCom50675.2020.00170
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Honeypots are the information system resources used for capturing and analysis of cyber attacks. High-interaction Honeypots are capable of capturing attacks in their totality and hence are an ideal choice for capturing multi-stage cyber attacks. The term multi-stage attack is an abstraction that refers to a class of cyber attacks consisting of multiple attack stages. These attack stages are executed either by malicious codes, scripts or sometimes even inbuilt system tools. In the work presented in this paper we have proposed a framework for capturing, analysis and modelling of multi-stage cyber attacks. The objective of our work is to devise an effective mechanism for the classification of multi-stage cyber attacks. The proposed framework comprise of a network of high interaction honeypots augmented with an attack analysis engine. The analysis engine performs rule based labeling of captured honeypot data. The labeling engine labels the attack data as generic events. These events are further fused to generate attack graphs. The hence generated attack graphs are used to characterize and later classify the multi-stage cyber attacks.
引用
收藏
页码:1269 / 1276
页数:8
相关论文
共 50 条
  • [31] Detection and mitigation of attacks on transportation networks as a multi-stage security game
    Laszka, Aron
    Abbas, Waseem
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    COMPUTERS & SECURITY, 2019, 87
  • [32] Detecting multi-stage attacks using sequence-to-sequence model
    Zhou, Peng
    Zhou, Gongyan
    Wu, Dakui
    Fei, Minrui
    COMPUTERS & SECURITY, 2021, 105
  • [33] Towards a Framework to Detect Multi-Stage Advanced Persistent Threats Attacks
    Bhatt, Parth
    Yano, Edgar Toshiro
    Gustavsson, Per M.
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 390 - 395
  • [34] Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information
    Aparicio-Navarro, Francisco J.
    Chadza, Timothy A.
    Kyriakopoulos, Konstantinos G.
    Ghafir, Ibrahim
    Lambotharan, Sangarapillai
    AsSadhan, Basil
    PROCEEDINGS OF THE 2019 22ND CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2019, : 188 - 194
  • [35] Detection model for multi-stage attacks based on WOWA-FCM
    Lu, Zhen-Bang
    Zhou, Li-Hua
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2008, 40 (01): : 122 - 126
  • [36] Active event correlation in Bro IDS to detect multi-stage attacks
    Chen, Bing
    Lee, Joohan
    Wu, Annie S.
    FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 32 - +
  • [37] Multi-stage Process Analysis and Modelling based Online Monitoring for Chip Packaging Process
    Qin, Yan
    Zhao, Chunhui
    Gao, Furong
    IFAC PAPERSONLINE, 2015, 48 (28): : 993 - 998
  • [38] Numerical Modelling for Efficient Analysis of Large Size Multi-Stage Incremental Sheet Forming
    Abdel-Nasser, Yehia
    Ma, Ninshu
    Rashed, Sherif
    Miyamoto, Kenji
    Miwa, Hirotaka
    JOURNAL OF MANUFACTURING AND MATERIALS PROCESSING, 2024, 8 (01):
  • [39] Multi-stage nanofiltration for brine concentration: experimental and modelling study
    Pasqualin, P.
    Davies, P. A.
    DESALINATION, 2023, 566
  • [40] Multi-stage hysteresis modelling of magnetorheological dampers and experimental verification
    Li, Jiahao
    Liao, Changrong
    Xie, Lei
    Wei, Xin
    Du, Xinxin
    Gan, Bin
    Shou, Mengjie
    INTERNATIONAL JOURNAL OF MECHANICAL SCIENCES, 2023, 254