A Process Mining-based approach for Attacker Profiling

Marcelo Rodríguez, Gustavo Betarte, Daniel Calegari
{"title":"A Process Mining-based approach for Attacker Profiling","authors":"Marcelo Rodríguez, Gustavo Betarte, Daniel Calegari","doi":"10.1109/urucon53396.2021.9647342","DOIUrl":null,"url":null,"abstract":"Reacting adequately to cybersecurity attacks requires observing the attackers' knowledge, skills, and behaviors to examine their influence over the system and understand the characteristics associated with these attacks. Profiling an attacker allows generating security countermeasures that can be adopted even from the design of the systems. For automated attackers, e.g., malware, it is possible to identify structured behavior, i.e., a process-like behavior consisting of several (partial) ordered activities. Process Mining (PM) is a discipline from the organizational context that focuses on analyzing the event logs associated with executing the system's processes to discover many aspects of process behavior. Few proposals are applying PM to attacker profiling. In this work, we explore the use of PM techniques to identify the behavior of cyber attackers. In particular, we illustrate, using an application example, how they can be adapted to an environment dominated by automated attackers. We discuss preliminary results and provide guidelines for future work.","PeriodicalId":337257,"journal":{"name":"2021 IEEE URUCON","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE URUCON","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/urucon53396.2021.9647342","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Reacting adequately to cybersecurity attacks requires observing the attackers' knowledge, skills, and behaviors to examine their influence over the system and understand the characteristics associated with these attacks. Profiling an attacker allows generating security countermeasures that can be adopted even from the design of the systems. For automated attackers, e.g., malware, it is possible to identify structured behavior, i.e., a process-like behavior consisting of several (partial) ordered activities. Process Mining (PM) is a discipline from the organizational context that focuses on analyzing the event logs associated with executing the system's processes to discover many aspects of process behavior. Few proposals are applying PM to attacker profiling. In this work, we explore the use of PM techniques to identify the behavior of cyber attackers. In particular, we illustrate, using an application example, how they can be adapted to an environment dominated by automated attackers. We discuss preliminary results and provide guidelines for future work.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于进程挖掘的攻击者分析方法
充分应对网络安全攻击需要观察攻击者的知识、技能和行为,以检查他们对系统的影响,并了解与这些攻击相关的特征。分析攻击者允许生成甚至可以从系统设计中采用的安全对策。对于自动攻击者,例如恶意软件,可以识别结构化行为,即由几个(部分)有序活动组成的类似过程的行为。过程挖掘(Process Mining, PM)是来自组织环境的一门学科,侧重于分析与执行系统过程相关的事件日志,以发现过程行为的许多方面。很少有建议将PM应用于攻击者分析。在这项工作中,我们探索使用PM技术来识别网络攻击者的行为。特别地,我们将使用一个应用程序示例来说明如何使它们适应由自动化攻击者主导的环境。我们讨论初步结果,并为今后的工作提供指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Advanced Cardiovascular Life Support High Fidelity Simulator: Review and Feasibility Analysis Failure Prediction in Automatic Reclosers Using Machine Learning Approaches Half-wave dipole antenna design comparison of 60, 67 y 74 GHz frequencies Dear presenters Fingerprint Recognition Based on Wavelet Transform and Ensemble Subspace Classifier
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1