A Behavioral Study of Advanced Security Attacks in Enterprise Networks

Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand,...

Full description

Saved in:
Bibliographic Details
Published in2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) pp. 1 - 5
Main Authors Ashwini Kumari, M, Nandini Prasad, K S
Format Conference Proceeding
LanguageEnglish
Published IEEE 16.12.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand, advanced security attacks, also known as Advanced Persistent threats (APTs) are highly customized and sophisticated attacks which are carefully designed to target a specific company or organization. These attacks are more difficult to prevent, detect and mitigate since they are designed to evade the security measures available in the targeted organization. Such attacks not only involve a variety of tools but also employ a variety of tactics and techniques. This paper is an effort to study the various characteristics of APTs and categorize attack indicators into relevant groups for the purpose of comparison and evaluation. Finally, we summarize the effectiveness of employing these behavioral indicators in the detection of an on-going APT attack in an enterprise network.
AbstractList Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand, advanced security attacks, also known as Advanced Persistent threats (APTs) are highly customized and sophisticated attacks which are carefully designed to target a specific company or organization. These attacks are more difficult to prevent, detect and mitigate since they are designed to evade the security measures available in the targeted organization. Such attacks not only involve a variety of tools but also employ a variety of tactics and techniques. This paper is an effort to study the various characteristics of APTs and categorize attack indicators into relevant groups for the purpose of comparison and evaluation. Finally, we summarize the effectiveness of employing these behavioral indicators in the detection of an on-going APT attack in an enterprise network.
Author Nandini Prasad, K S
Ashwini Kumari, M
Author_xml – sequence: 1
  givenname: M
  surname: Ashwini Kumari
  fullname: Ashwini Kumari, M
  email: ashwini.muthigi@gmail.com
  organization: Dr. Ambedkar Institute of Technology,Department of ISE,Bangalore,India
– sequence: 2
  givenname: K S
  surname: Nandini Prasad
  fullname: Nandini Prasad, K S
  email: nandini.is@drait.edu.in
  organization: Dr. Ambedkar Institute of Technology,Department of ISE,Bangalore,India
BookMark eNotj71OwzAURo0EA5Q-AYtfIMHXTvwzhqiFShUMKXPl2NfCakmQ4xbl7alEp285OjrfA7kdxgEJocBKAGae226z67q64kKXnHEojdTcMHFDlkZpkLKumLyA92Td0Bf8suc4JnukXT75mY6BNv5sB4eeduhOKeaZNjlbd5hoHOhqyJh-UpyQvmP-HdNheiR3wR4nXF53QT7Xq137Vmw_Xjdtsy0igM5FsLxnqF0dHO-FAuk9t0JhLaxSUoegPQSURiAIVSNgr4KDCrhUFTBhxYI8_XsjIu4vDd82zfvrO_EHfENKYw
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSITSS54238.2021.9682903
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665406109
1665406100
EndPage 5
ExternalDocumentID 9682903
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-fa2b0e8c5fc2b3716dd2a37e53a7768ff8d1fe693e1375e1eb7fc1412674103a3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:50 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-fa2b0e8c5fc2b3716dd2a37e53a7768ff8d1fe693e1375e1eb7fc1412674103a3
PageCount 5
ParticipantIDs ieee_primary_9682903
PublicationCentury 2000
PublicationDate 2021-Dec.-16
PublicationDateYYYYMMDD 2021-12-16
PublicationDate_xml – month: 12
  year: 2021
  text: 2021-Dec.-16
  day: 16
PublicationDecade 2020
PublicationTitle 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
PublicationTitleAbbrev CSITSS
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8321398
Snippet Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times....
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Advanced Persistent Attack
APT
Attack Indicators
Companies
Computational modeling
Conferences
Data models
Detection strategy
Industries
Ransomware
Security
Title A Behavioral Study of Advanced Security Attacks in Enterprise Networks
URI https://ieeexplore.ieee.org/document/9682903
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pa8IwFA7qaadt6NhvcthxqU3StOnRieIGyqAK3iRJX0AGdcx6cH_9krY6NnbYLYRAfsL3Xt73vYfQg3UPgxopSCqBkUjanCijBFFcOvxwFokwXo08ncWTRfSyFMsWejxqYQCgIp9B4JtVLD_fmJ3_KuunsQ_78TZqy5DVWq0DOSdM-8PseZ5lwtkHnrLFaNAM_1E3pYKN8SmaHias2SJvwa7Ugfn8lYvxvys6Q71vgR5-PULPOWpB0UXjAX46iu6xJwju8cbiQRPlx1lTqg4PytIr6_G6wKOac7jeAp7VhPBtDy3Go_lwQpoyCWTtvIOSWMV0CNIIa5jmzv_Jc6Z4AoKrxDkT1sqcWohTDpQnAijoxBoaURY7ayLkil-gTrEp4BJhrSJjnUvIBfi0NVKxMJWaG0l93jedXKGuP4PVe50JY9Vs__rv7ht04u_Bkz9ofIs65ccO7hyEl_q-ursvm3ecnQ
link.rule.ids 310,311,786,790,795,796,802,27956,55107
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zHvSksom_zcGj6ZqmadPjlI1NtyF0g91Gkr7AEDpx3UH_epO2mygevIVAyE_43sv7vvcQujP2YVAtOEkEBCQUJiNSS04kExY_rEXCtVMjjyfRYBY-zfm8ge53WhgAKMln4LlmGcvPVnrjvso6SeTCfmwP7Vuc9-NKrbWl5_hJ5zEdTtOUWwvBkbYC6tUDflROKYGjf4TG2ykrvsirtymUpz9_ZWP875qOUftboodfduBzghqQt1C_ix92snvsKIIfeGVwt47z47QuVoe7ReG09XiZ417FOlyuAU8qSvi6jWb93vRxQOpCCWRp_YOCGBkoH4TmRgeKWQ8oywLJYuBMxtadMEZk1ECUMKAs5kBBxUbTkAaRtSd8JtkpauarHM4QVjLUxjqFjINLXCNk4CdCMS2oy_ym4nPUcmeweKtyYSzq7V_83X2LDgbT8WgxGk6eL9GhuxNHBaHRFWoW7xu4toBeqJvyHr8ADQmf8Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+IEEE+International+Conference+on+Computation+System+and+Information+Technology+for+Sustainable+Solutions+%28CSITSS%29&rft.atitle=A+Behavioral+Study+of+Advanced+Security+Attacks+in+Enterprise+Networks&rft.au=Ashwini+Kumari%2C+M&rft.au=Nandini+Prasad%2C+K+S&rft.date=2021-12-16&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCSITSS54238.2021.9682903&rft.externalDocID=9682903