A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach
[article]
2019
arXiv
pre-print
In this paper, a theoretical framework is presented for modeling lateral movement attacks and for proposing a methodology for designing resilient cyber systems against such attacks. ...
Lateral movement attacks are a serious threat to enterprise security. ...
Clearly, there is a need for designing large enterprises that are resilient against such lateral movement attacks. Our current work takes a step in this direction. ...
arXiv:1905.01002v1
fatcat:xo5fa4oic5eohmexvvrkoywxb4
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement
2021
IEEE Access
Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. ...
Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. ...
This paper proposes a method to predict the most likely attack path for adversarial lateral movement and deter the adversarial lateral movement using a cyber deception approach. ...
doi:10.1109/access.2021.3069105
fatcat:5rsprlywnbfy3ikvmxm4fpns4y
On Moving Target Techniques for Network Defense Security
2021
International journal of recent technology and engineering
The moving target defense idea appeared as a preemptive protect mechanism aimed at preventing attacks. ...
This paper conducts a comprehensive study to cover the following aspects of moving target defense, characteristics of target attacks and its limitation, classifications of defense types, major methodologies ...
Likewise, Authors in [33] proposed a strategic approach to selecting ML to defend against adversarial ML technique. ...
doi:10.35940/ijrte.e5111.019521
fatcat:stts5i22abfvzpcf3cawvjvpmy
powerLang: a probabilistic attack simulation language for the power domain
2020
Energy Informatics
AbstractCyber-attacks these threats, the cyber security assessment of IT and OT infrastructures can foster a higher degree of safety and resilience against cyber-attacks. ...
Finally, this first version of the language was validated against a known cyber-attack. ...
Lastly, there are Connections between Applications that allow a communication along different Networks, and consequently, a lateral movement of an attacker. ...
doi:10.1186/s42162-020-00134-4
fatcat:pg5z3fzmyzedpkipvkljdjcamy
Cyber Network Resilience against Self-Propagating Malware Attacks
[article]
2022
arXiv
pre-print
In this paper, we explore the problem of developing cyber resilient systems capable of mitigating the spread of SPM attacks. ...
We evaluate all defense strategies in detail using six real-world communication graphs collected from a large retail network and compare their performance across a wide range of attacks and network topologies ...
In this paper, we take a graph robustness perspective for proactively protecting enterprise networks against self-propagating malware attacks. ...
arXiv:2206.13594v1
fatcat:iprsjpafvna2hi6cr7okyx6ozm
Quantitative SoS Architecture Modeling
2014
Procedia Computer Science
Proceeding along the sequence in Figure 1 , a Mission Goal approach does not yield an architecture until much later in the sequence than current methodologies -and after exhaustive graph based data analytics ...
Social media (Google, Facebook, Twitter) (Malewicz, 2010; Google, 2013; Facebook, 2013; Russell, 2013) and cyber physical security have recognized this limitation and shifted to graph theory based approaches ...
doi:10.1016/j.procs.2014.09.104
fatcat:6dy7aogilvhwlf6wpsjkvattiq
The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User
2020
2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis ...
Rzemyk Technical codes' potentialies in cyber security: A contextual approach on the ethics of small digital organizations in France Theo Simon and Bertrand Venard Think Smart, Play Dumb: A Game-Theoretic ...
The approach presented is validated against three experimental usage scenarios. ...
doi:10.1109/cybersa49311.2020.9139668
dblp:conf/cybersa/CarrollLB20
fatcat:mtrvk2uvknadrosalvit4xz67i
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
[article]
2019
arXiv
pre-print
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks. ...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. ...
Pros and Cons: Many MTD approaches for enterprise networks have been developed using game theoretic approaches by modeling an attack-defense game. ...
arXiv:1909.08092v1
fatcat:wsycpvaqgzdcvboagxlbg5x6uu
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT CK
[article]
2021
arXiv
pre-print
We emulate this mapping in a pre-emptive fashion to facilitate a rigorous cyber risk assessment, support intrusion detection, and design defences based on common APT TTPs in a 5GCN. ...
We adopt a pre-emptive approach to identifying adversarial techniques which can be used to launch attacks on the 5G core network (5GCN) and map these to its components. ...
Acknowledgement This work was partly funded by a UK Government PhD Studentship Scheme. ...
arXiv:2108.11206v4
fatcat:eg4fn5kknzed5fjwajvsqs5zzu
A review of threat modelling approaches for APT-style attacks
2021
Heliyon
Defending against threats and attacks requires actionable threat intelligence. ...
Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario. ...
This approach identifies enterprise risk and a sector specific threat landscape and further extends Bodeau's approach [54] . ...
doi:10.1016/j.heliyon.2021.e05969
pmid:33506133
pmcid:PMC7814160
fatcat:zif6ebwcqrhr7pkudsq2ynqpgm
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
[article]
2021
arXiv
pre-print
As a first step towards ultimately tackling this problem, we propose a systematic framework for modeling and quantifying the cybersecurity effectiveness of network diversity, including a suite of cybersecurity ...
The deployment of monoculture software stacks can have devastating consequences because a single attack can compromise all of the vulnerable computers in cyberspace. ...
Cam, Controllability and Observability of Risk and Resilience in of Cyber Security and is serving as its Steering Committee Chair. He
Cyber-Physical Cloud Systems, pp. 325–343. ...
arXiv:2112.07826v1
fatcat:exuuezz5yjakjpzvpzprmvawpi
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
2020
Applied Sciences
many different perspectives and focuses on the theoretical, technical, and statistical aspects of insider threats. ...
However, there are many limitations, such as a lack of real cases, biases in making conclusions, which are a major concern and remain unclear, and the lack of a study that surveys insider threats from ...
[180] suggested an approach that uses the resilient aggregation technique to leverage current communication redundancy. ...
doi:10.3390/app10155208
fatcat:xcgn37pohnaqlipqrhvwfrkgee
COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques
2019
Zenodo
Ontological foundation for a framework to Relate / Combine Modeling Languages and Techniques. ...
A highly resilient system should be self-healing and comprise early detection and fast recovery mechanisms against failures to continue to meet the demands for services. ...
RDF is a model for data interchange on the Web where data is represented as graphs. ...
doi:10.5281/zenodo.2538795
fatcat:ox2slzxzdbcrjha2xeoz75a7vy
COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques
2019
Zenodo
Ontological foundation for a framework to Relate / Combine Modeling Languages and Techniques. ...
A highly resilient system should be self-healing and comprise early detection and fast recovery mechanisms against failures to continue to meet the demands for services. ...
RDF is a model for data interchange on the Web where data is represented as graphs. ...
doi:10.5281/zenodo.2527577
fatcat:qsugbjnclbe4hnz46sunlqvj5a
Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey
2022
Security and Communication Networks
We also take an in-depth look at the testbed implementations and resilience and performance evaluations of MTD approaches. ...
The concept of moving target defense (MTD) has recently emerged as an effective and agile defense mechanism against DoS attacks that particularly target cloud-hosted applications. ...
Among works employing attack graph approaches, Nguyen et al. ...
doi:10.1155/2022/2223050
fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
« Previous
Showing results 1 — 15 out of 668 results