Filters








52,419 Hits in 5.8 sec

Hierarchical Multi-Stage Cyber Attack Scenario Modeling Based on G&E Model for Cyber Risk Simulation Analysis

Myung Kil Ahn, Yong Hyun Kim, Jung-Ryun Lee
2020 Applied Sciences  
Herein, we propose a hierarchical multi-stage cyber attack scenario modeling based on the goal and effect (G&E) model and analysis system, which enables expression of various goals of attack and damage  ...  Cyber attacks, especially in large-scale military network environments, have a fatal effect on security; therefore, various experiments and analyses must be conducted to establish the necessary preparations  ...  APT (Advanced Persistent Threat): a covert cyber attack on a computer network where the attacker gains and maintains unauthorized access to the targeted network and remains undetected for a significant  ... 
doi:10.3390/app10041426 fatcat:x46icwt3enhenimbeetit46r2a

Systematic Literature Review of Security Event Correlation Methods

Igor Kotenko, Diana Gaifulina, Igor Zelichenok
2022 IEEE Access  
Security event correlation approaches are necessary to detect and predict incremental threats such as multi-step or targeted attacks (advanced persistent threats) and other causal sequences of abnormal  ...  The research method is a systematic literature review, which includes the formulation of research questions, the choice of keywords and criteria for inclusion and exclusion.  ...  The main application of these approaches is to detect individual stages of multi-step attacks and the sequence of stages.  ... 
doi:10.1109/access.2022.3168976 fatcat:uk3h6prqh5d73m6vrximkk2lty

Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures [chapter]

Zhendong Ma, Paul Smith
2013 Lecture Notes in Computer Science  
In contrast to previous work, we propose a practical and vulnerability-centric risk analysis approach for determining security risks associated with advanced, multi-step cyber-attacks.  ...  An important step in securing Critical Information Infrastructures (CIIs) against cyber-attacks is risk analysis -understanding security risks, based on a systematic analysis of information on vulnerabilities  ...  Acknowledgements This work has been supported by the "PRECYSE -Protection, prevention and reaction to cyber-attacks to critical infrastructures" project, funded by the European Commission with contract  ... 
doi:10.1007/978-3-319-03964-0_13 fatcat:gq4yeub7rvfrna3dnffefkveoy

POSTER

Anoop Singhal, Changwei Liu, Duminda Wijesekara
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
Modern-day attackers tend to use sophisticated multi-stage, multihost attack techniques and anti-forensics tools to cover their attack traces.  ...  Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack scenarios from evidence left behind by the attackers of an enterprise system is challenging.  ...  Also, this tool can be used to assist judge/jury or law students to better understand a multi-step, multihost attack towards an enterprise network by using a visual graph and probabilities.  ... 
doi:10.1145/2810103.2810106 dblp:conf/ccs/SinghalLW15 fatcat:ndif74qv25amfclbjuw5fyq4um

Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective [chapter]

Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, William H. Sanders
2015 Lecture Notes in Computer Science  
We show the need for a cyber-physical perspective in order to understand the cross-domain attack/defense and the complicated physical consequence of cyber breaches.  ...  use them to study the challenges for conducting security analysis in this domain.  ...  NRF2014NCR-NCR001-31) and administered by the National Cybersecurity R&D Directorate, and supported in part by Singapore's Agency for Science, Technology, and Research (A*STAR) under the Human Sixth Sense  ... 
doi:10.1007/978-3-319-24249-1_24 fatcat:axb3cj543bbqtlihhcjx2q62d4

Multi Model Transmission Analysis Based Efficient Intrusion Detection System for Improved Performance

2019 International Journal of Engineering and Advanced Technology  
To solve this issue, an efficient multi model analysis based approach is described in this article.  ...  The proposed multi model approach monitors the network packets in different level by analyzing the payload, path, host and frequency of incoming packets.  ...  To overcome this, this paper presents a multi model network analysis algorithm for efficient intrusion detection.  ... 
doi:10.35940/ijeat.f8932.088619 fatcat:qyob3s6ldnhtdinqch3bwimeba

Semantics-aware detection of targeted attacks: a survey

Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser
2016 Journal in Computer Virology and Hacking Techniques  
However, few of these solutions have a particular focus on Advanced Persistent Threats or similarly sophisticated multi-stage attacks.  ...  To overcome these obstacles, we present a structured review of semantics-aware works that have a high potential for contributing to the analysis or detection of targeted attacks.  ...  The main goal of this paper is to systematically review available literature on the topic of host-based, network-based, and multi-source detection of cyber-attacks with a focus on semantics-aware and semantics-based  ... 
doi:10.1007/s11416-016-0273-3 fatcat:flhbpc4uwbandby2adxi62t64u

A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning

Imatitikua D. Aiyanyo, Hamman Samuel, Heuiseok Lim
2020 Applied Sciences  
This is a systematic review of over one hundred research papers about machine learning methods applied to defensive and offensive cybersecurity.  ...  In contrast to previous reviews, which focused on several fragments of research topics in this area, this paper systematically and comprehensively combines domain knowledge into a single review.  ...  The authors made some modifications to the Markov reward model which is often used to detect multi-stage cyberattacks.  ... 
doi:10.3390/app10175811 fatcat:xnuwg7qumbbzzmuxlsh7d33cam

Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection

Artur Rot, Boguslaw Olszewski
2017 Position Papers of the 2017 Federated Conference on Computer Science and Information Systems  
APT should be seen as a complex phenomenon, an existing danger to companies, organisations and public entities.  ...  This article showcases the problem of APT, the biggest threats related to them, and chosen methods and tools that can be effectively used to counter APT attacks.  ...  Defence-in-depth means, therefore, a layered approach to network security, and taking steps to detect a threat, react to it and eliminate it, in every layer.  ... 
doi:10.15439/2017f488 dblp:conf/fedcsis/RotO17 fatcat:qlavigka25hj5orem3d2dsan2a

SmartX Multi-Sec: A Visibility-centric Multi-tiered Security Framework for Multi-site Cloud-native Edge Clusters

Jun-Sik Shin, JongWon Kim
2021 IEEE Access  
Zero-trust security can be a promising conceptual approach to protect the complicated networking of multi-site VOLUME 4, 2016 cloud-native edge clouds from networking-based threats.  ...  Furthermore, SmartX Multi-Sec suggests a systematic approach for edge-cloud security and supports further research on intelligent security (e.g., AI/DLbased intrusion detection systems, resource-aware  ... 
doi:10.1109/access.2021.3115523 fatcat:f7gyr6atf5gpnccpwq4ybj32x4

Analysis framework of network security situational awareness and comparison of implementation methods

Yan Li, Guang-qiu Huang, Chun-zi Wang, Ying-chao Li
2019 EURASIP Journal on Wireless Communications and Networking  
In an attempt to provide a panoramic recognition of network security situational awareness, and auxiliary ideas for the industrialization of network security, this paper aims to provide some references  ...  Studies, focusing on network security, have experienced four main stages: idealized design for ensuring security, auxiliary examination and passive defense, active analysis and strategy formulation, and  ...  His main research directions include system engineering, big data application analysis, and network security. He worked in software companies from 2009 to 2017.  ... 
doi:10.1186/s13638-019-1506-1 fatcat:lzamend3krbfhmntenrhmywx2u

Real-Time Detection Method for Surface Defects of Stamping Parts Based on Template Matching*

Bin Li, Yun Wu, Fengxia Guo, Jun Qi
2019 IOP Conference Series: Earth and Environment  
In an attempt to provide a panoramic recognition of network security situational awareness, and auxiliary ideas for the industrialization of network security, this paper aims to provide some references  ...  Studies, focusing on network security, have experienced four main stages: idealized design for ensuring security, auxiliary examination and passive defense, active analysis and strategy formulation, and  ...  His main research directions include system engineering, big data application analysis, and network security. He worked in software companies from 2009 to 2017.  ... 
doi:10.1088/1755-1315/252/2/022076 fatcat:rqbvta44rrcivoyjzy5pebwdwe

Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids [article]

Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres
2021 arXiv   pre-print
In this paper, we present an approach that collects and correlates cross-domain cyber threat information to detect multi-stage cyber-attacks in energy information systems.  ...  To provide an adequate basis to contextually assess and understand the situation of smart grids in case of coordinated cyber-attacks, we need a systematic and coherent approach to identify cyber incidents  ...  To this end, in this paper, we present a kill-chain-based correlation approach -DOMCA -to contextually identify multi-stage cyber-attacks with severe consequences for reliable power supply in SGs.  ... 
arXiv:2109.02336v1 fatcat:rhpdrzdbhfgzdkyidqkrusypdu

Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey

Vani Rajasekar, Premalatha Jayapaul, Sathya Krishnamoorthi, Muzafer Saračević
2021 Acta Polytechnica Hungarica  
Security is a major concern in IoT because it allows secure access to remote services.  ...  The implementation of the Tele Medicine Information System (TMIS) over public networks continues to disclose confidential information to unauthorized entities.  ...  of a masquerade assault. 9) Insider attack: An insider attack is a deliberate misuse of people allowed to use computers and networks.  ... 
doi:10.12700/aph.18.3.2021.3.5 fatcat:z6m33sofgngg3e4xr2zwfxm5ta

How to design multi-target drugs

Tamás Korcsmáros, Máté S Szalay, Csaba Böde, István A Kovács, Péter Csermely
2007 Expert Opinion on Drug Discovery  
Here we review the recent progress in this field, compare possible network attack strategies, and propose several methods to find target-sets for multi-target drugs.  ...  Multi-target drugs and combinatorial therapies multiply the number of pharmacologically relevant target molecules by introducing a set of indirect, networkdependent effects.  ...  Most of the above network-related methods have been used so far to steer target-identification attempts to single targets and a systematic network-based analysis of multi-target drug action is still to  ... 
doi:10.1517/17460441.2.6.799 pmid:23488998 fatcat:gxlmf3t2yvddxm6rapf437pdf4
« Previous Showing results 1 — 15 out of 52,419 results