Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework

P. Rajesh, Mansoor Alam, M. Tahernezhadi, A. Monika, G. Chanakya
{"title":"Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework","authors":"P. Rajesh, Mansoor Alam, M. Tahernezhadi, A. Monika, G. Chanakya","doi":"10.1109/IDSTA55301.2022.9923170","DOIUrl":null,"url":null,"abstract":"With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence (CTI) and their teams requires to analyze different techniques being employed by adversaries to hit a target objective. The attacker objectives can be from entering in your network, accessing system files and folders remotely, getting higher system privileges, stealing confidential passwords etc. to destroying systems and network. Pre attack patterns defined in enterprise knowledge base can play a major role to track adversary techniques and procedures in order to defend and response from such attacks. Anomalous and intrusion activities need to be unfolded by the approach adversaries are adopting to demolish secure enterprise networks. An appropriate system is required to better handle modern attack approaches and strategies used by attackers in order to identify vulnerabilities and successfully defend network channels. In this paper, we present an in-depth analysis of different threat detection methods and how to mitigate their impacts using MITRE ATT&CK framework. This framework is an extensively and freely accessible knowledge repository of tactics, techniques and procedures (TTPs) to gain an insight into what techniques adversaries are using in real time applications which aids in developing robust threat controlling programs in private sector, government, and in cybersecurity community.","PeriodicalId":268343,"journal":{"name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDSTA55301.2022.9923170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence (CTI) and their teams requires to analyze different techniques being employed by adversaries to hit a target objective. The attacker objectives can be from entering in your network, accessing system files and folders remotely, getting higher system privileges, stealing confidential passwords etc. to destroying systems and network. Pre attack patterns defined in enterprise knowledge base can play a major role to track adversary techniques and procedures in order to defend and response from such attacks. Anomalous and intrusion activities need to be unfolded by the approach adversaries are adopting to demolish secure enterprise networks. An appropriate system is required to better handle modern attack approaches and strategies used by attackers in order to identify vulnerabilities and successfully defend network channels. In this paper, we present an in-depth analysis of different threat detection methods and how to mitigate their impacts using MITRE ATT&CK framework. This framework is an extensively and freely accessible knowledge repository of tactics, techniques and procedures (TTPs) to gain an insight into what techniques adversaries are using in real time applications which aids in developing robust threat controlling programs in private sector, government, and in cybersecurity community.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于MITRE攻击框架的网络威胁检测与仿真分析
随着网络攻击的迅速增加,网络威胁情报(CTI)等威胁猎人及其团队需要分析对手用来攻击目标的不同技术。攻击者的目标可以从进入您的网络,远程访问系统文件和文件夹,获得更高的系统权限,窃取机密密码等破坏系统和网络。在企业知识库中定义的预攻击模式可以发挥主要作用,跟踪对手的技术和过程,以防御和响应此类攻击。异常和入侵活动需要通过攻击者采用的方法来展开,以破坏安全的企业网络。为了识别漏洞并成功地保护网络通道,需要一个适当的系统来更好地处理攻击者使用的现代攻击方法和策略。在本文中,我们深入分析了不同的威胁检测方法,以及如何使用MITRE ATT&CK框架减轻其影响。该框架是一个广泛且免费访问的战术、技术和程序(TTPs)知识库,可以深入了解对手在实时应用中使用的技术,这有助于在私营部门、政府和网络安全社区开发强大的威胁控制程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Practical web security testing: Evolution of web application modules and open source testing tools Malware analysis and multi-label category detection issues: Ensemble-based approaches Improved YOLOv3-tiny Object Detector with Dilated CNN for Drone-Captured Images EEG-based Image Feature Extraction for Visual Classification using Deep Learning On the Development of Mobile Application Breathing Analyzer to Detect Breathing Abnormalities
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1