A System for Detecting Targeted Cyber-Attacks Using Attack Patterns

被引:2
|
作者
Herwono, Ian [1 ]
El-Moussa, Fadi Ali [1 ]
机构
[1] Secur Futures Practice Res & Innovat BT, Ipswich IP3 5RE, Suffolk, England
来源
基金
欧盟地平线“2020”;
关键词
Cyber security; Attack patterns; Knowledge sharing Visualization;
D O I
10.1007/978-3-319-93354-2_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting multi-stage cyber-attacks remains a challenge for any security analyst working in large corporate environments. Conventional security solutions such as intrusion detection systems tend to report huge amount of alerts that still need to be examined and cross-checked with other available data in order to eliminate false positives and identify any legitimate attacks. Attack patterns can be used as a means to describe causal relationships between the events detected at different stages of an attack. In this paper, we introduce an agent-based system that collects relevant event data from various sources in the network, and then correlates the events according to predefined attack patterns. The system allows security analysts to formulate the attack patterns based on their own knowledge and experience, and test them on available datasets. We present an example attack pattern for discovering suspicious activities in the network following a potential brute force attack on one of the servers. We discuss the results produced by our prototype implementation and show how a security analyst can drill down further into the data to identify the victim and obtain information about the attack methods.
引用
收藏
页码:20 / 34
页数:15
相关论文
共 50 条
  • [1] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [2] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    [J]. Cluster Computing, 2021, 24 : 1435 - 1453
  • [3] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
  • [4] Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns
    Stergiopoulos, George
    Gritzalis, Dimitris A.
    Limnaios, Evangelos
    [J]. IEEE ACCESS, 2020, 8 : 128440 - 128475
  • [5] Detecting cyber-attacks using a CRPS-based monitoring approach
    Harrou, Fouzi
    Bouyeddou, Benamar
    Sun, Ying
    Kadri, Benamar
    [J]. 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 618 - 622
  • [6] Tiny Twins for detecting cyber-attacks at runtime using concise Rebeca time transition system
    Moradi, Fereidoun
    Pourvatan, Bahman
    Asadollah, Sara Abbaspour
    Sirjani, Marjan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 184
  • [7] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    [J]. 2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,
  • [8] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [9] Attack-Tolerant Network Control System Based on the Deception for the Cyber-Attacks
    Yaseen, Amer Atta
    Bayart, Mireille
    [J]. 2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2015, : 37 - 44
  • [10] Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks
    Pasandideh, Shabnam
    Gomes, Luis
    Malo, Pedro
    [J]. 2019 IEEE 28TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2019, : 1644 - 1649