Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix

Md. Ariful Haque, Sachin Shetty, C. Kamhoua, Kimberly Gold
{"title":"Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix","authors":"Md. Ariful Haque, Sachin Shetty, C. Kamhoua, Kimberly Gold","doi":"10.1109/ICNC57223.2023.10074241","DOIUrl":null,"url":null,"abstract":"Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities. Attack graph has always been a crucial tool for network vulnerability analysis. However, the current state-of-the-art attack graph can not predict adversarial techniques. To overcome the gap, we utilize the MITRE ATT&CK matrix in this work and map the techniques with the attack graph node descriptions. We first formulate a comprehensive dataset from ATT&CK consisting of all the adversarial strategies, subtechniques, associated tactics, and mitigation for the enterprise network. We then capture the attack graph node descriptions and apply the term frequency-inverse document frequency (TF-IDF) algorithm to map the attack techniques with the available node descriptions. Next, we generate the cosine similarity to determine an adversary’s top methods to attack a network. We then map those techniques with the associated tactics and mitigation strategies as enumerated in the ATT&CK matrix. Finally, we illustrate the analysis using a networked system’s attack graph. This proposed method would help identify and validate adversarial techniques and guide in selecting mitigation mechanisms for security enhancement.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computing, Networking and Communications (ICNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNC57223.2023.10074241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities. Attack graph has always been a crucial tool for network vulnerability analysis. However, the current state-of-the-art attack graph can not predict adversarial techniques. To overcome the gap, we utilize the MITRE ATT&CK matrix in this work and map the techniques with the attack graph node descriptions. We first formulate a comprehensive dataset from ATT&CK consisting of all the adversarial strategies, subtechniques, associated tactics, and mitigation for the enterprise network. We then capture the attack graph node descriptions and apply the term frequency-inverse document frequency (TF-IDF) algorithm to map the attack techniques with the available node descriptions. Next, we generate the cosine similarity to determine an adversary’s top methods to attack a network. We then map those techniques with the associated tactics and mitigation strategies as enumerated in the ATT&CK matrix. Finally, we illustrate the analysis using a networked system’s attack graph. This proposed method would help identify and validate adversarial techniques and guide in selecting mitigation mechanisms for security enhancement.
基于攻击图和攻击与ck矩阵的对抗技术验证与防御选择
如今,网络攻击者利用先进技术攻击目标资产。要对付攻击者,最重要的是了解他们可能用来利用网络漏洞的潜在技术。攻击图一直是网络漏洞分析的重要工具。然而,目前最先进的攻击图无法预测对抗技术。为了克服这一差距,我们在这项工作中使用了MITRE攻击和ck矩阵,并将这些技术与攻击图节点描述进行了映射。我们首先从ATT&CK中制定了一个全面的数据集,其中包括针对企业网络的所有对抗策略、子技术、相关战术和缓解措施。然后,我们捕获攻击图节点描述,并应用术语频率逆文档频率(TF-IDF)算法将攻击技术与可用的节点描述进行映射。接下来,我们生成余弦相似度来确定对手攻击网络的最佳方法。然后,我们将这些技术与ATT&CK矩阵中列举的相关战术和缓解策略进行映射。最后,我们使用网络系统的攻击图来说明分析。该建议的方法将有助于识别和验证对抗性技术,并指导选择缓解机制以增强安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信