Analysis and modelling of multi-stage attacks

被引:1
|
作者
Chamotra, Saurabh [1 ]
Barbhuiya, Ferdous Ahmed [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Cyber Secur Technol Div, Mohali, India
[2] Indian Inst Informat Technol IIIT Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Honeypot; multi-stage attacks; Attack modelling; Machine learning; Malware analysis;
D O I
10.1109/TrustCom50675.2020.00170
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Honeypots are the information system resources used for capturing and analysis of cyber attacks. High-interaction Honeypots are capable of capturing attacks in their totality and hence are an ideal choice for capturing multi-stage cyber attacks. The term multi-stage attack is an abstraction that refers to a class of cyber attacks consisting of multiple attack stages. These attack stages are executed either by malicious codes, scripts or sometimes even inbuilt system tools. In the work presented in this paper we have proposed a framework for capturing, analysis and modelling of multi-stage cyber attacks. The objective of our work is to devise an effective mechanism for the classification of multi-stage cyber attacks. The proposed framework comprise of a network of high interaction honeypots augmented with an attack analysis engine. The analysis engine performs rule based labeling of captured honeypot data. The labeling engine labels the attack data as generic events. These events are further fused to generate attack graphs. The hence generated attack graphs are used to characterize and later classify the multi-stage cyber attacks.
引用
收藏
页码:1269 / 1276
页数:8
相关论文
共 50 条
  • [11] Security Attacks on Multi-Stage Proof-of-Work
    D'Arco, Paolo
    Ansaroudi, Zahra Ebadi
    2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 698 - 703
  • [12] Intrusion damage assessment for multi-stage attacks for clouds
    Arshad, Junaid
    Azad, Muhammad Ajmal
    Jokhio, Imran Ali
    Townend, Paul
    IET COMMUNICATIONS, 2013, 7 (12) : 1304 - 1315
  • [13] Graph based system for multi-stage attacks recognition
    School of Computer Science, Harbin Institute of Technology, Harbin 150001, China
    High Technol Letters, 2008, 2 (167-173):
  • [14] Predicting Multi-Stage Attacks Based on IP Information
    Almutairi, Abdulrazaq
    Parish, David
    Flint, James
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 384 - 390
  • [15] Intrusion Damage Assessment for Multi-stage Attacks for Clouds
    Arshad, Junaid
    Jokhio, Imran Ali
    Shah, Mahmood
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 132 - +
  • [16] Evaluation of Attackers' Skill Levels in Multi-Stage Attacks
    Mezesova, Terezia
    Sokol, Pavol
    Bajtos, Tomas
    INFORMATION, 2020, 11 (11) : 1 - 15
  • [17] A structural framework for modeling multi-stage network attacks
    Daley, K
    Larson, R
    Dawkins, J
    2002 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS OF THE WORKSHOPS, 2002, : 5 - 10
  • [18] Evaluating threat assessment for multi-stage cyber attacks
    Yang, Shanchieh Jay
    Holsopple, Jared
    Sudit, Moises
    MILCOM 2006, VOLS 1-7, 2006, : 1287 - +
  • [19] A graph based system for multi-stage attacks recognition
    Safaa O.Al-Mamory
    HighTechnologyLetters, 2008, 14 (02) : 167 - 173
  • [20] Evaluation of Attacker Skill Level for Multi-stage Attacks
    Mezesova, Terezia
    Sokol, Pavol
    Bajtos, Tomas
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,