Visible to the public Modeling the Operational Phases of APT Campaigns

TitleModeling the Operational Phases of APT Campaigns
Publication TypeConference Paper
Year of Publication2019
AuthorsBerady, Aimad, Viet Triem Tong, Valerie, Guette, Gilles, Bidan, Christophe, Carat, Guillaume
Conference Name2019 International Conference on Computational Science and Computational Intelligence (CSCI)
Keywordsadvanced persistent threat, advanced persistent threat attacks, Analytical models, APT, APT attack, APT campaigns, attack chronology, Computational modeling, computer network security, Context modeling, Cyber Kill Chain, cyber threat intelligence, cyberspace operations, Data models, decision making, final objectives achievement, Human Behavior, Knowledge engineering, Metrics, NIST, operational phases, operational reading, pubcrawl, resilience, Resiliency, Scalability, Tactics Techniques and Procedures
AbstractIn the context of Advanced Persistent Threat (APT) attacks, this paper introduces a model, called Nuke, which tries to provide a more operational reading of the attackers' lifecycle in a compromised network. It allows to consider the notions of regression; and repetitiveness of final objectives achievement. By confronting this model with examples of recent attacks (Equifax data breach and TV5Monde sabotage), we emphasize the importance of the attack chronology in the Cyber Threat Intelligence (CTI) reports, as well as the Tactics, Techniques and Procedures (TTP) used by the attacker during his progression.
DOI10.1109/CSCI49370.2019.00023
Citation Keyberady_modeling_2019