Filters








668 Hits in 5.7 sec

Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach [article]

Pin-Yu Chen, Sutanay Choudhury, Luke Rodriguez, Alfred Hero, Indrajit Ray
2019 arXiv   pre-print
In this paper, a theoretical framework is presented for modeling lateral movement attacks and for proposing a methodology for designing resilient cyber systems against such attacks.  ...  Lateral movement attacks are a serious threat to enterprise security.  ...  Clearly, there is a need for designing large enterprises that are resilient against such lateral movement attacks. Our current work takes a step in this direction.  ... 
arXiv:1905.01002v1 fatcat:xo5fa4oic5eohmexvvrkoywxb4

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement

Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
2021 IEEE Access  
Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement.  ...  Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs.  ...  This paper proposes a method to predict the most likely attack path for adversarial lateral movement and deter the adversarial lateral movement using a cyber deception approach.  ... 
doi:10.1109/access.2021.3069105 fatcat:5rsprlywnbfy3ikvmxm4fpns4y

On Moving Target Techniques for Network Defense Security

Shouq Mohsen Alnemari, Sabah M Alzahrani
2021 International journal of recent technology and engineering  
The moving target defense idea appeared as a preemptive protect mechanism aimed at preventing attacks.  ...  This paper conducts a comprehensive study to cover the following aspects of moving target defense, characteristics of target attacks and its limitation, classifications of defense types, major methodologies  ...  Likewise, Authors in [33] proposed a strategic approach to selecting ML to defend against adversarial ML technique.  ... 
doi:10.35940/ijrte.e5111.019521 fatcat:stts5i22abfvzpcf3cawvjvpmy

powerLang: a probabilistic attack simulation language for the power domain

Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt
2020 Energy Informatics  
AbstractCyber-attacks these threats, the cyber security assessment of IT and OT infrastructures can foster a higher degree of safety and resilience against cyber-attacks.  ...  Finally, this first version of the language was validated against a known cyber-attack.  ...  Lastly, there are Connections between Applications that allow a communication along different Networks, and consequently, a lateral movement of an attacker.  ... 
doi:10.1186/s42162-020-00134-4 fatcat:pg5z3fzmyzedpkipvkljdjcamy

Cyber Network Resilience against Self-Propagating Malware Attacks [article]

Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Priyanka Angadi, John Loughner, Matthew Wilden, Nicola Perra, Tina Eliassi-Rad, Alina Oprea
2022 arXiv   pre-print
In this paper, we explore the problem of developing cyber resilient systems capable of mitigating the spread of SPM attacks.  ...  We evaluate all defense strategies in detail using six real-world communication graphs collected from a large retail network and compare their performance across a wide range of attacks and network topologies  ...  In this paper, we take a graph robustness perspective for proactively protecting enterprise networks against self-propagating malware attacks.  ... 
arXiv:2206.13594v1 fatcat:iprsjpafvna2hi6cr7okyx6ozm

Quantitative SoS Architecture Modeling

Joseph W. Marvin, Robert K. Garrett Jr.
2014 Procedia Computer Science  
Proceeding along the sequence in Figure 1 , a Mission Goal approach does not yield an architecture until much later in the sequence than current methodologies -and after exhaustive graph based data analytics  ...  Social media (Google, Facebook, Twitter) (Malewicz, 2010; Google, 2013; Facebook, 2013; Russell, 2013) and cyber physical security have recognized this limitation and shifted to graph theory based approaches  ... 
doi:10.1016/j.procs.2014.09.104 fatcat:6dy7aogilvhwlf6wpsjkvattiq

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User

Fiona Carroll, Phil Legg, Bastian Bonkel
2020 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)  
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis  ...  Rzemyk Technical codes' potentialies in cyber security: A contextual approach on the ethics of small digital organizations in France Theo Simon and Bertrand Venard Think Smart, Play Dumb: A Game-Theoretic  ...  The approach presented is validated against three experimental usage scenarios.  ... 
doi:10.1109/cybersa49311.2020.9139668 dblp:conf/cybersa/CarrollLB20 fatcat:mtrvk2uvknadrosalvit4xz67i

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks.  ...  Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  Pros and Cons: Many MTD approaches for enterprise networks have been developed using game theoretic approaches by modeling an attack-defense game.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT CK [article]

Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis, Ryan Heartfield
2021 arXiv   pre-print
We emulate this mapping in a pre-emptive fashion to facilitate a rigorous cyber risk assessment, support intrusion detection, and design defences based on common APT TTPs in a 5GCN.  ...  We adopt a pre-emptive approach to identifying adversarial techniques which can be used to launch attacks on the 5G core network (5GCN) and map these to its components.  ...  Acknowledgement This work was partly funded by a UK Government PhD Studentship Scheme.  ... 
arXiv:2108.11206v4 fatcat:eg4fn5kknzed5fjwajvsqs5zzu

A review of threat modelling approaches for APT-style attacks

Matt Tatam, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti
2021 Heliyon  
Defending against threats and attacks requires actionable threat intelligence.  ...  Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario.  ...  This approach identifies enterprise risk and a sector specific threat landscape and further extends Bodeau's approach [54] .  ... 
doi:10.1016/j.heliyon.2021.e05969 pmid:33506133 pmcid:PMC7814160 fatcat:zif6ebwcqrhr7pkudsq2ynqpgm

Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity [article]

Huashan Chen, Hasan Cam, Shouhuai Xu
2021 arXiv   pre-print
As a first step towards ultimately tackling this problem, we propose a systematic framework for modeling and quantifying the cybersecurity effectiveness of network diversity, including a suite of cybersecurity  ...  The deployment of monoculture software stacks can have devastating consequences because a single attack can compromise all of the vulnerable computers in cyberspace.  ...  Cam, Controllability and Observability of Risk and Resilience in of Cyber Security and is serving as its Steering Committee Chair. He Cyber-Physical Cloud Systems, pp. 325–343.  ... 
arXiv:2112.07826v1 fatcat:exuuezz5yjakjpzvpzprmvawpi

A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations

Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Z. Zainal Abidin, Warusia Yassin, Aslinda Hassan, Karrar Hameed Abdulkareem, Nabeel Salih Ali, Zahri Yunos
2020 Applied Sciences  
many different perspectives and focuses on the theoretical, technical, and statistical aspects of insider threats.  ...  However, there are many limitations, such as a lack of real cases, biases in making conclusions, which are a major concern and remain unclear, and the lack of a study that surveys insider threats from  ...  [180] suggested an approach that uses the resilient aggregation technique to leverage current communication redundancy.  ... 
doi:10.3390/app10155208 fatcat:xcgn37pohnaqlipqrhvwfrkgee

COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques

Rima Al-Ali, Moussa Amrani, Soumyadip Bandyopadhyay, Ankica Barisic, Fernando Barros, Dominique Blouin, Ferhat Erata, Holger Giese, Mauro Iacono, Stefan Klikovits, Eva Navarro, Patrizio Pelliccione (+3 others)
2019 Zenodo  
Ontological foundation for a framework to Relate / Combine Modeling Languages and Techniques.  ...  A highly resilient system should be self-healing and comprise early detection and fast recovery mechanisms against failures to continue to meet the demands for services.  ...  RDF is a model for data interchange on the Web where data is represented as graphs.  ... 
doi:10.5281/zenodo.2538795 fatcat:ox2slzxzdbcrjha2xeoz75a7vy

COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques

Rima Al-Ali, Moussa Amrani, Soumyadip Bandyopadhyay, Ankica Barisic, Fernando Barros, Dominique Blouin, Ferhat Erata, Holger Giese, Mauro Iacono, Stefan Klikovits, Eva Navarro, Patrizio Pelliccione (+3 others)
2019 Zenodo  
Ontological foundation for a framework to Relate / Combine Modeling Languages and Techniques.  ...  A highly resilient system should be self-healing and comprise early detection and fast recovery mechanisms against failures to continue to meet the demands for services.  ...  RDF is a model for data interchange on the Web where data is represented as graphs.  ... 
doi:10.5281/zenodo.2527577 fatcat:qsugbjnclbe4hnz46sunlqvj5a

Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey

Minh Nguyen, Saptarshi Debroy, AnMin Fu
2022 Security and Communication Networks  
We also take an in-depth look at the testbed implementations and resilience and performance evaluations of MTD approaches.  ...  The concept of moving target defense (MTD) has recently emerged as an effective and agile defense mechanism against DoS attacks that particularly target cloud-hosted applications.  ...  Among works employing attack graph approaches, Nguyen et al.  ... 
doi:10.1155/2022/2223050 fatcat:3figtl7ju5ezjbn3gwvzhjxj4e
« Previous Showing results 1 — 15 out of 668 results