Analysis and modelling of multi-stage attacks

被引:1
|
作者
Chamotra, Saurabh [1 ]
Barbhuiya, Ferdous Ahmed [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Cyber Secur Technol Div, Mohali, India
[2] Indian Inst Informat Technol IIIT Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
Honeypot; multi-stage attacks; Attack modelling; Machine learning; Malware analysis;
D O I
10.1109/TrustCom50675.2020.00170
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Honeypots are the information system resources used for capturing and analysis of cyber attacks. High-interaction Honeypots are capable of capturing attacks in their totality and hence are an ideal choice for capturing multi-stage cyber attacks. The term multi-stage attack is an abstraction that refers to a class of cyber attacks consisting of multiple attack stages. These attack stages are executed either by malicious codes, scripts or sometimes even inbuilt system tools. In the work presented in this paper we have proposed a framework for capturing, analysis and modelling of multi-stage cyber attacks. The objective of our work is to devise an effective mechanism for the classification of multi-stage cyber attacks. The proposed framework comprise of a network of high interaction honeypots augmented with an attack analysis engine. The analysis engine performs rule based labeling of captured honeypot data. The labeling engine labels the attack data as generic events. These events are further fused to generate attack graphs. The hence generated attack graphs are used to characterize and later classify the multi-stage cyber attacks.
引用
收藏
页码:1269 / 1276
页数:8
相关论文
共 50 条
  • [41] Modelling commitment in multi-stage models of location, trade and environment
    Ulph, A
    Valentini, L
    ENVIRONMENTAL ECONOMICS AND THE INTERNATIOANAL ECONOMY, 2002, 25 : 55 - 88
  • [42] Unsupervised multi-stage attack detection framework without details on single-stage attacks
    Shin, Jinmyeong
    Choi, Seok-Hwan
    Liu, Peng
    Choi, Yoon-Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 811 - 825
  • [43] Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things
    Li, Xinghua
    Xu, Mengfan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Liu, Ximeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8820 - 8831
  • [44] Janus: A two-sided analytical model for multi-stage coordinated attacks
    Zhang, Zonghua
    Ho, Pin-Han
    Lin, Xiaodong
    Shen, Hong
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 136 - 154
  • [45] Dynamical analysis of multi-stage cyclic structures
    Laxalde, D.
    Thouverez, F.
    Lombard, J-P.
    MECHANICS RESEARCH COMMUNICATIONS, 2007, 34 (04) : 379 - 384
  • [46] Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
    Sen, Oemer
    van der Velde, Dennis
    Wehrmeister, Katharina A.
    Hacker, Immanuel
    Henze, Martin
    Andres, Michael
    2021 INTERNATIONAL CONFERENCE ON SMART ENERGY SYSTEMS AND TECHNOLOGIES (SEST), 2021,
  • [47] Analysis of multi-stage treatments for recurrent diseases
    Huang, Xuelin
    Ning, Jing
    STATISTICS IN MEDICINE, 2012, 31 (24) : 2805 - 2821
  • [48] On using contextual correlation to detect multi-stage cyber attacks in smart grids
    Sen, Oemer
    van der Velde, Dennis
    Wehrmeister, Katharina A.
    Hacker, Immanuel
    Henze, Martin
    Andres, Michael
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2022, 32
  • [49] INTERACTIVE GRAPHICS FOR ANALYSIS OF MULTI-STAGE CULTURE
    LAM, HLY
    BUNGAY, HR
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1984, 188 (AUG): : 92 - MBTD
  • [50] Performance analysis of multi-stage thermoelectric coolers
    Karimi, G.
    Culham, J. R.
    Kazerouni, V.
    INTERNATIONAL JOURNAL OF REFRIGERATION-REVUE INTERNATIONALE DU FROID, 2011, 34 (08): : 2129 - 2135