ACH Reference Model- A model of Architecture to Handle Advanced Cyberattacks

G. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal
{"title":"ACH Reference Model- A model of Architecture to Handle Advanced Cyberattacks","authors":"G. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal","doi":"10.1109/ICAECT54875.2022.9808076","DOIUrl":null,"url":null,"abstract":"In the modern world, nations and corporates are afraid of highly sophisticated state or nation sponsored cyber attacks referred to as Advanced Persistent Threats (APTs). Attackers are increasingly employing APTs to target susceptible systems. The attack group frequently uses complex strategies and tools during the APT assault process, posing numerous challenges for information security systems. Traditional defence mechanisms and Intrusion Detection Systems (IDS) cannot detect these types of attacks. The Defence system fails when relying on a single approach or method to detect advanced attacks. As attacker uses unique strategies, tools and methods to launch APTs, different layers of defence in the system are necessary to thwart the attacks. A robust defence mechanism is in high demand to address these APT attacks. All the existing frameworks are based on the attack steps and stages used by the attack groups, and there is a lack of a robust defence model in cyberspace that the system defenders could use to build a strong defence mechanism. This article proposes the four-layered model, called Advanced Cyberattack Handling (ACH) reference Model. This model is created by considering four different layers to cope with the processes like data handling, characterization, detection and mitigation of the advanced cyberattacks like APTs. Furthermore, this model is flexible enough to be used by the defenders of sensitive systems to handle real-time scenarios and meet the demands of changing world.","PeriodicalId":346658,"journal":{"name":"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECT54875.2022.9808076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the modern world, nations and corporates are afraid of highly sophisticated state or nation sponsored cyber attacks referred to as Advanced Persistent Threats (APTs). Attackers are increasingly employing APTs to target susceptible systems. The attack group frequently uses complex strategies and tools during the APT assault process, posing numerous challenges for information security systems. Traditional defence mechanisms and Intrusion Detection Systems (IDS) cannot detect these types of attacks. The Defence system fails when relying on a single approach or method to detect advanced attacks. As attacker uses unique strategies, tools and methods to launch APTs, different layers of defence in the system are necessary to thwart the attacks. A robust defence mechanism is in high demand to address these APT attacks. All the existing frameworks are based on the attack steps and stages used by the attack groups, and there is a lack of a robust defence model in cyberspace that the system defenders could use to build a strong defence mechanism. This article proposes the four-layered model, called Advanced Cyberattack Handling (ACH) reference Model. This model is created by considering four different layers to cope with the processes like data handling, characterization, detection and mitigation of the advanced cyberattacks like APTs. Furthermore, this model is flexible enough to be used by the defenders of sensitive systems to handle real-time scenarios and meet the demands of changing world.
ACH参考模型——处理高级网络攻击的体系结构模型
在现代世界,国家和企业害怕高度复杂的国家或国家赞助的网络攻击,称为高级持续威胁(apt)。攻击者越来越多地使用apt来攻击易受影响的系统。攻击组织在APT攻击过程中经常使用复杂的策略和工具,给信息安全系统带来了诸多挑战。传统的防御机制和入侵检测系统(IDS)无法检测这些类型的攻击。当依靠单一的方法或方法来检测高级攻击时,防御系统会失败。由于攻击者使用独特的策略、工具和方法来启动apt,因此需要在系统中设置不同的防御层来阻止攻击。需要一个强大的防御机制来应对这些APT攻击。所有现有的框架都是基于攻击组使用的攻击步骤和阶段,并且在网络空间中缺乏一个强大的防御模型,系统防御者可以使用它来建立一个强大的防御机制。本文提出了一个四层模型,称为高级网络攻击处理(ACH)参考模型。该模型是通过考虑四个不同的层来创建的,以应对数据处理、特征描述、检测和缓解apt等高级网络攻击等过程。此外,该模型足够灵活,可以被敏感系统的捍卫者用来处理实时场景并满足不断变化的世界的需求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信