An Early Detection Model for Kerberoasting Attacks and Dataset Labeling

IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Jordanian Journal of Computers and Information Technology Pub Date : 2022-01-01 DOI:10.5455/jjcit.71-1661423262
Remah Younisse, Mouhammd Alkasassbeh, Mohammad Almseidin, Hamza Abdi
{"title":"An Early Detection Model for Kerberoasting\nAttacks and Dataset Labeling","authors":"Remah Younisse, Mouhammd Alkasassbeh, Mohammad Almseidin, Hamza Abdi","doi":"10.5455/jjcit.71-1661423262","DOIUrl":null,"url":null,"abstract":"The wild nature of humans has become civilized, and the weapons they use to attack each other are now digitized. Security over the Internet usually takes a defensive shape, aiming to fight against attacks created for malicious reasons. Invaders’ actions over the internet can take patterns by going through specific steps every time they attack. These patterns can be used to predict, mitigate and stop these attacks. This study proposes a method to label datasets related to multi-stage attacks according to attack stages rather than the attack type. These datasets can be used later in machine learning models to build intelligent defensive models. On the other hand, we propose a method to predict and early kill attacks in an active directory environment, such as Kerberoasting attacks. In this study, we have collected the data related to a suggested Kerberoasting attack scenario in pcap files. Every pcap file contains the data related to a particular stage of the attack lifecycle, the extracted information from the pcap files was used to highlight the features and specific activities during every stage. The information was used to draw an efficient defensive plan against the attack. Here we propose a methodology to draw equivalent defensive plans for other similar attacks as the Kerberoasting attack covered in this study.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":0.9000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jordanian Journal of Computers and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5455/jjcit.71-1661423262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2

Abstract

The wild nature of humans has become civilized, and the weapons they use to attack each other are now digitized. Security over the Internet usually takes a defensive shape, aiming to fight against attacks created for malicious reasons. Invaders’ actions over the internet can take patterns by going through specific steps every time they attack. These patterns can be used to predict, mitigate and stop these attacks. This study proposes a method to label datasets related to multi-stage attacks according to attack stages rather than the attack type. These datasets can be used later in machine learning models to build intelligent defensive models. On the other hand, we propose a method to predict and early kill attacks in an active directory environment, such as Kerberoasting attacks. In this study, we have collected the data related to a suggested Kerberoasting attack scenario in pcap files. Every pcap file contains the data related to a particular stage of the attack lifecycle, the extracted information from the pcap files was used to highlight the features and specific activities during every stage. The information was used to draw an efficient defensive plan against the attack. Here we propose a methodology to draw equivalent defensive plans for other similar attacks as the Kerberoasting attack covered in this study.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
kerberos攻击的早期检测模型及数据集标注
人类的野性变得文明了,他们用来互相攻击的武器现在也数字化了。互联网上的安全通常采取防御形式,旨在对抗恶意攻击。入侵者在互联网上的行动可以通过每次攻击都经过特定的步骤来形成模式。这些模式可用于预测、减轻和阻止这些攻击。本研究提出了一种根据攻击阶段而不是攻击类型来标记与多阶段攻击相关的数据集的方法。这些数据集可以在机器学习模型中使用,以构建智能防御模型。另一方面,我们提出了一种在活动目录环境中预测和早期消灭攻击的方法,例如Kerberoasting攻击。在本研究中,我们在pcap文件中收集了与建议的kerberoasting攻击场景相关的数据。每个pcap文件都包含与攻击生命周期的特定阶段相关的数据,从pcap文件中提取的信息用于突出显示每个阶段的功能和特定活动。这些信息被用来制定一个有效的防御计划。在这里,我们提出了一种方法,可以为本研究中涉及的kerberos攻击等其他类似攻击制定等效的防御计划。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Jordanian Journal of Computers and Information Technology
Jordanian Journal of Computers and Information Technology Computer Science-Computer Science (all)
CiteScore
3.10
自引率
25.00%
发文量
19
期刊最新文献
OPTIMAL ENERGY CONSUMPTION AND COST PERFORMANCE SOLUTION WITH DELAY CONSTRAINTS ON FOG COMPUTING ORTHOGONAL REGRESSED STEEPEST DESCENT DEEP PERCEPTIVE NEURAL LEARNING FOR IoT- AWARE SECURED BIG DATA COMMUNICATION AUTOMATIC DETECTION OF PNEUMONIA USING CONCATENATED CONVOLUTIONAL NEURAL NETWORK DESIGN OF A COMPACT BROADBAND ANTENNA USING CHARACTERISTIC MODE ANALYSIS FOR MICROWAVE APPLICATIONS Effectiveness of zero-shot models in automatic Arabic Poem generation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1