Visible to the public Analysis and Modelling of Multi-Stage Attacks

TitleAnalysis and Modelling of Multi-Stage Attacks
Publication TypeConference Paper
Year of Publication2020
AuthorsChamotra, Saurabh, Barbhuiya, Ferdous Ahmed
Conference Name2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Date Publisheddec
KeywordsAnalytical models, Attack modelling, Computational modeling, cyberattack, Engines, graph theory, honeypot, Human Behavior, Labeling, machine learning, malware analysis, Metrics, multi-stage attacks, privacy, pubcrawl, resilience, Resiliency, security, Tools
AbstractHoneypots are the information system resources used for capturing and analysis of cyber attacks. Highinteraction Honeypots are capable of capturing attacks in their totality and hence are an ideal choice for capturing multi-stage cyber attacks. The term multi-stage attack is an abstraction that refers to a class of cyber attacks consisting of multiple attack stages. These attack stages are executed either by malicious codes, scripts or sometimes even inbuilt system tools. In the work presented in this paper we have proposed a framework for capturing, analysis and modelling of multi-stage cyber attacks. The objective of our work is to devise an effective mechanism for the classification of multi-stage cyber attacks. The proposed framework comprise of a network of high interaction honeypots augmented with an attack analysis engine. The analysis engine performs rule based labeling of captured honeypot data. The labeling engine labels the attack data as generic events. These events are further fused to generate attack graphs. The hence generated attack graphs are used to characterize and later classify the multi-stage cyber attacks.
DOI10.1109/TrustCom50675.2020.00170
Citation Keychamotra_analysis_2020