A Process Mining-based approach for Attacker Profiling

Marcelo Rodríguez, Gustavo Betarte, Daniel Calegari
{"title":"A Process Mining-based approach for Attacker Profiling","authors":"Marcelo Rodríguez, Gustavo Betarte, Daniel Calegari","doi":"10.1109/urucon53396.2021.9647342","DOIUrl":null,"url":null,"abstract":"Reacting adequately to cybersecurity attacks requires observing the attackers' knowledge, skills, and behaviors to examine their influence over the system and understand the characteristics associated with these attacks. Profiling an attacker allows generating security countermeasures that can be adopted even from the design of the systems. For automated attackers, e.g., malware, it is possible to identify structured behavior, i.e., a process-like behavior consisting of several (partial) ordered activities. Process Mining (PM) is a discipline from the organizational context that focuses on analyzing the event logs associated with executing the system's processes to discover many aspects of process behavior. Few proposals are applying PM to attacker profiling. In this work, we explore the use of PM techniques to identify the behavior of cyber attackers. In particular, we illustrate, using an application example, how they can be adapted to an environment dominated by automated attackers. We discuss preliminary results and provide guidelines for future work.","PeriodicalId":337257,"journal":{"name":"2021 IEEE URUCON","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE URUCON","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/urucon53396.2021.9647342","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Reacting adequately to cybersecurity attacks requires observing the attackers' knowledge, skills, and behaviors to examine their influence over the system and understand the characteristics associated with these attacks. Profiling an attacker allows generating security countermeasures that can be adopted even from the design of the systems. For automated attackers, e.g., malware, it is possible to identify structured behavior, i.e., a process-like behavior consisting of several (partial) ordered activities. Process Mining (PM) is a discipline from the organizational context that focuses on analyzing the event logs associated with executing the system's processes to discover many aspects of process behavior. Few proposals are applying PM to attacker profiling. In this work, we explore the use of PM techniques to identify the behavior of cyber attackers. In particular, we illustrate, using an application example, how they can be adapted to an environment dominated by automated attackers. We discuss preliminary results and provide guidelines for future work.
基于进程挖掘的攻击者分析方法
充分应对网络安全攻击需要观察攻击者的知识、技能和行为,以检查他们对系统的影响,并了解与这些攻击相关的特征。分析攻击者允许生成甚至可以从系统设计中采用的安全对策。对于自动攻击者,例如恶意软件,可以识别结构化行为,即由几个(部分)有序活动组成的类似过程的行为。过程挖掘(Process Mining, PM)是来自组织环境的一门学科,侧重于分析与执行系统过程相关的事件日志,以发现过程行为的许多方面。很少有建议将PM应用于攻击者分析。在这项工作中,我们探索使用PM技术来识别网络攻击者的行为。特别地,我们将使用一个应用程序示例来说明如何使它们适应由自动化攻击者主导的环境。我们讨论初步结果,并为今后的工作提供指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信