Analysis of Cyberattack Patterns by User Behavior Analytics

Csaba Krasznay, Balázs Péter Hámornik
{"title":"Analysis of Cyberattack Patterns by User Behavior Analytics","authors":"Csaba Krasznay, Balázs Péter Hámornik","doi":"10.32565/aarms.2018.3.7","DOIUrl":null,"url":null,"abstract":"Targeted attacks cause the most serious problems nowadays in the cyberspace, as in most cases they are used for cyber espionage, in cyber warfare activities and have a significant role in data leaks both in the governmental and private sector. Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them. Therefore, a new way of cyber defense is needed to reduce risk caused by Advanced Persistent Threat (APT). In this paper we review the process of targeted cyberattacks, focusing on the challenges of authentication, then we introduce user behavior analytics (UBA) as a potential countermeasure. We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system.","PeriodicalId":171955,"journal":{"name":"Academic and Applied Research in Military and Public Management Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Academic and Applied Research in Military and Public Management Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32565/aarms.2018.3.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Targeted attacks cause the most serious problems nowadays in the cyberspace, as in most cases they are used for cyber espionage, in cyber warfare activities and have a significant role in data leaks both in the governmental and private sector. Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them. Therefore, a new way of cyber defense is needed to reduce risk caused by Advanced Persistent Threat (APT). In this paper we review the process of targeted cyberattacks, focusing on the challenges of authentication, then we introduce user behavior analytics (UBA) as a potential countermeasure. We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system.
基于用户行为分析的网络攻击模式分析
针对性攻击是当今网络空间中最严重的问题,因为在大多数情况下,它们被用于网络间谍活动,网络战争活动,并在政府和私营部门的数据泄露中发挥重要作用。同时,由于其背后的战略、战术和选择的工具,很难及时发现此类攻击。因此,需要一种新的网络防御方式来降低高级持续威胁(APT)带来的风险。在本文中,我们回顾了目标网络攻击的过程,重点关注身份验证的挑战,然后我们介绍了用户行为分析(UBA)作为潜在的对策。我们还通过案例研究强调了网络攻击对公司的破坏性,以及为什么UBA在现代网络防御系统中是一个很好的候选者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信