G. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal
{"title":"ACH参考模型——处理高级网络攻击的体系结构模型","authors":"G. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal","doi":"10.1109/ICAECT54875.2022.9808076","DOIUrl":null,"url":null,"abstract":"In the modern world, nations and corporates are afraid of highly sophisticated state or nation sponsored cyber attacks referred to as Advanced Persistent Threats (APTs). Attackers are increasingly employing APTs to target susceptible systems. The attack group frequently uses complex strategies and tools during the APT assault process, posing numerous challenges for information security systems. Traditional defence mechanisms and Intrusion Detection Systems (IDS) cannot detect these types of attacks. The Defence system fails when relying on a single approach or method to detect advanced attacks. As attacker uses unique strategies, tools and methods to launch APTs, different layers of defence in the system are necessary to thwart the attacks. A robust defence mechanism is in high demand to address these APT attacks. All the existing frameworks are based on the attack steps and stages used by the attack groups, and there is a lack of a robust defence model in cyberspace that the system defenders could use to build a strong defence mechanism. This article proposes the four-layered model, called Advanced Cyberattack Handling (ACH) reference Model. This model is created by considering four different layers to cope with the processes like data handling, characterization, detection and mitigation of the advanced cyberattacks like APTs. Furthermore, this model is flexible enough to be used by the defenders of sensitive systems to handle real-time scenarios and meet the demands of changing world.","PeriodicalId":346658,"journal":{"name":"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ACH Reference Model- A model of Architecture to Handle Advanced Cyberattacks\",\"authors\":\"G. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal\",\"doi\":\"10.1109/ICAECT54875.2022.9808076\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the modern world, nations and corporates are afraid of highly sophisticated state or nation sponsored cyber attacks referred to as Advanced Persistent Threats (APTs). Attackers are increasingly employing APTs to target susceptible systems. The attack group frequently uses complex strategies and tools during the APT assault process, posing numerous challenges for information security systems. Traditional defence mechanisms and Intrusion Detection Systems (IDS) cannot detect these types of attacks. The Defence system fails when relying on a single approach or method to detect advanced attacks. As attacker uses unique strategies, tools and methods to launch APTs, different layers of defence in the system are necessary to thwart the attacks. A robust defence mechanism is in high demand to address these APT attacks. All the existing frameworks are based on the attack steps and stages used by the attack groups, and there is a lack of a robust defence model in cyberspace that the system defenders could use to build a strong defence mechanism. This article proposes the four-layered model, called Advanced Cyberattack Handling (ACH) reference Model. This model is created by considering four different layers to cope with the processes like data handling, characterization, detection and mitigation of the advanced cyberattacks like APTs. Furthermore, this model is flexible enough to be used by the defenders of sensitive systems to handle real-time scenarios and meet the demands of changing world.\",\"PeriodicalId\":346658,\"journal\":{\"name\":\"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECT54875.2022.9808076\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECT54875.2022.9808076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ACH Reference Model- A model of Architecture to Handle Advanced Cyberattacks
In the modern world, nations and corporates are afraid of highly sophisticated state or nation sponsored cyber attacks referred to as Advanced Persistent Threats (APTs). Attackers are increasingly employing APTs to target susceptible systems. The attack group frequently uses complex strategies and tools during the APT assault process, posing numerous challenges for information security systems. Traditional defence mechanisms and Intrusion Detection Systems (IDS) cannot detect these types of attacks. The Defence system fails when relying on a single approach or method to detect advanced attacks. As attacker uses unique strategies, tools and methods to launch APTs, different layers of defence in the system are necessary to thwart the attacks. A robust defence mechanism is in high demand to address these APT attacks. All the existing frameworks are based on the attack steps and stages used by the attack groups, and there is a lack of a robust defence model in cyberspace that the system defenders could use to build a strong defence mechanism. This article proposes the four-layered model, called Advanced Cyberattack Handling (ACH) reference Model. This model is created by considering four different layers to cope with the processes like data handling, characterization, detection and mitigation of the advanced cyberattacks like APTs. Furthermore, this model is flexible enough to be used by the defenders of sensitive systems to handle real-time scenarios and meet the demands of changing world.