基于MITRE攻击框架的网络威胁检测与仿真分析

P. Rajesh, Mansoor Alam, M. Tahernezhadi, A. Monika, G. Chanakya
{"title":"基于MITRE攻击框架的网络威胁检测与仿真分析","authors":"P. Rajesh, Mansoor Alam, M. Tahernezhadi, A. Monika, G. Chanakya","doi":"10.1109/IDSTA55301.2022.9923170","DOIUrl":null,"url":null,"abstract":"With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence (CTI) and their teams requires to analyze different techniques being employed by adversaries to hit a target objective. The attacker objectives can be from entering in your network, accessing system files and folders remotely, getting higher system privileges, stealing confidential passwords etc. to destroying systems and network. Pre attack patterns defined in enterprise knowledge base can play a major role to track adversary techniques and procedures in order to defend and response from such attacks. Anomalous and intrusion activities need to be unfolded by the approach adversaries are adopting to demolish secure enterprise networks. An appropriate system is required to better handle modern attack approaches and strategies used by attackers in order to identify vulnerabilities and successfully defend network channels. In this paper, we present an in-depth analysis of different threat detection methods and how to mitigate their impacts using MITRE ATT&CK framework. This framework is an extensively and freely accessible knowledge repository of tactics, techniques and procedures (TTPs) to gain an insight into what techniques adversaries are using in real time applications which aids in developing robust threat controlling programs in private sector, government, and in cybersecurity community.","PeriodicalId":268343,"journal":{"name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework\",\"authors\":\"P. Rajesh, Mansoor Alam, M. Tahernezhadi, A. Monika, G. Chanakya\",\"doi\":\"10.1109/IDSTA55301.2022.9923170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence (CTI) and their teams requires to analyze different techniques being employed by adversaries to hit a target objective. The attacker objectives can be from entering in your network, accessing system files and folders remotely, getting higher system privileges, stealing confidential passwords etc. to destroying systems and network. Pre attack patterns defined in enterprise knowledge base can play a major role to track adversary techniques and procedures in order to defend and response from such attacks. Anomalous and intrusion activities need to be unfolded by the approach adversaries are adopting to demolish secure enterprise networks. An appropriate system is required to better handle modern attack approaches and strategies used by attackers in order to identify vulnerabilities and successfully defend network channels. In this paper, we present an in-depth analysis of different threat detection methods and how to mitigate their impacts using MITRE ATT&CK framework. This framework is an extensively and freely accessible knowledge repository of tactics, techniques and procedures (TTPs) to gain an insight into what techniques adversaries are using in real time applications which aids in developing robust threat controlling programs in private sector, government, and in cybersecurity community.\",\"PeriodicalId\":268343,\"journal\":{\"name\":\"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IDSTA55301.2022.9923170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDSTA55301.2022.9923170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

随着网络攻击的迅速增加,网络威胁情报(CTI)等威胁猎人及其团队需要分析对手用来攻击目标的不同技术。攻击者的目标可以从进入您的网络,远程访问系统文件和文件夹,获得更高的系统权限,窃取机密密码等破坏系统和网络。在企业知识库中定义的预攻击模式可以发挥主要作用,跟踪对手的技术和过程,以防御和响应此类攻击。异常和入侵活动需要通过攻击者采用的方法来展开,以破坏安全的企业网络。为了识别漏洞并成功地保护网络通道,需要一个适当的系统来更好地处理攻击者使用的现代攻击方法和策略。在本文中,我们深入分析了不同的威胁检测方法,以及如何使用MITRE ATT&CK框架减轻其影响。该框架是一个广泛且免费访问的战术、技术和程序(TTPs)知识库,可以深入了解对手在实时应用中使用的技术,这有助于在私营部门、政府和网络安全社区开发强大的威胁控制程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework
With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence (CTI) and their teams requires to analyze different techniques being employed by adversaries to hit a target objective. The attacker objectives can be from entering in your network, accessing system files and folders remotely, getting higher system privileges, stealing confidential passwords etc. to destroying systems and network. Pre attack patterns defined in enterprise knowledge base can play a major role to track adversary techniques and procedures in order to defend and response from such attacks. Anomalous and intrusion activities need to be unfolded by the approach adversaries are adopting to demolish secure enterprise networks. An appropriate system is required to better handle modern attack approaches and strategies used by attackers in order to identify vulnerabilities and successfully defend network channels. In this paper, we present an in-depth analysis of different threat detection methods and how to mitigate their impacts using MITRE ATT&CK framework. This framework is an extensively and freely accessible knowledge repository of tactics, techniques and procedures (TTPs) to gain an insight into what techniques adversaries are using in real time applications which aids in developing robust threat controlling programs in private sector, government, and in cybersecurity community.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信