A Behavioral Study of Advanced Security Attacks in Enterprise Networks
Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand,...
Saved in:
Published in | 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) pp. 1 - 5 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
16.12.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand, advanced security attacks, also known as Advanced Persistent threats (APTs) are highly customized and sophisticated attacks which are carefully designed to target a specific company or organization. These attacks are more difficult to prevent, detect and mitigate since they are designed to evade the security measures available in the targeted organization. Such attacks not only involve a variety of tools but also employ a variety of tactics and techniques. This paper is an effort to study the various characteristics of APTs and categorize attack indicators into relevant groups for the purpose of comparison and evaluation. Finally, we summarize the effectiveness of employing these behavioral indicators in the detection of an on-going APT attack in an enterprise network. |
---|---|
AbstractList | Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks that use spam, adware or ransomware mostly target individual users with the purpose of making profit. On the other hand, advanced security attacks, also known as Advanced Persistent threats (APTs) are highly customized and sophisticated attacks which are carefully designed to target a specific company or organization. These attacks are more difficult to prevent, detect and mitigate since they are designed to evade the security measures available in the targeted organization. Such attacks not only involve a variety of tools but also employ a variety of tactics and techniques. This paper is an effort to study the various characteristics of APTs and categorize attack indicators into relevant groups for the purpose of comparison and evaluation. Finally, we summarize the effectiveness of employing these behavioral indicators in the detection of an on-going APT attack in an enterprise network. |
Author | Nandini Prasad, K S Ashwini Kumari, M |
Author_xml | – sequence: 1 givenname: M surname: Ashwini Kumari fullname: Ashwini Kumari, M email: ashwini.muthigi@gmail.com organization: Dr. Ambedkar Institute of Technology,Department of ISE,Bangalore,India – sequence: 2 givenname: K S surname: Nandini Prasad fullname: Nandini Prasad, K S email: nandini.is@drait.edu.in organization: Dr. Ambedkar Institute of Technology,Department of ISE,Bangalore,India |
BookMark | eNotj71OwzAURo0EA5Q-AYtfIMHXTvwzhqiFShUMKXPl2NfCakmQ4xbl7alEp285OjrfA7kdxgEJocBKAGae226z67q64kKXnHEojdTcMHFDlkZpkLKumLyA92Td0Bf8suc4JnukXT75mY6BNv5sB4eeduhOKeaZNjlbd5hoHOhqyJh-UpyQvmP-HdNheiR3wR4nXF53QT7Xq137Vmw_Xjdtsy0igM5FsLxnqF0dHO-FAuk9t0JhLaxSUoegPQSURiAIVSNgr4KDCrhUFTBhxYI8_XsjIu4vDd82zfvrO_EHfENKYw |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CSITSS54238.2021.9682903 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665406109 1665406100 |
EndPage | 5 |
ExternalDocumentID | 9682903 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i118t-fa2b0e8c5fc2b3716dd2a37e53a7768ff8d1fe693e1375e1eb7fc1412674103a3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:50 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-fa2b0e8c5fc2b3716dd2a37e53a7768ff8d1fe693e1375e1eb7fc1412674103a3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_9682903 |
PublicationCentury | 2000 |
PublicationDate | 2021-Dec.-16 |
PublicationDateYYYYMMDD | 2021-12-16 |
PublicationDate_xml | – month: 12 year: 2021 text: 2021-Dec.-16 day: 16 |
PublicationDecade | 2020 |
PublicationTitle | 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) |
PublicationTitleAbbrev | CSITSS |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8321398 |
Snippet | Securing enterprise networks from cyber attacks has become one of the most paramount and daunting tasks for any organization or industry in recent times.... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Advanced Persistent Attack APT Attack Indicators Companies Computational modeling Conferences Data models Detection strategy Industries Ransomware Security |
Title | A Behavioral Study of Advanced Security Attacks in Enterprise Networks |
URI | https://ieeexplore.ieee.org/document/9682903 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pa8IwFA7qaadt6NhvcthxqU3StOnRieIGyqAK3iRJX0AGdcx6cH_9krY6NnbYLYRAfsL3Xt73vYfQg3UPgxopSCqBkUjanCijBFFcOvxwFokwXo08ncWTRfSyFMsWejxqYQCgIp9B4JtVLD_fmJ3_KuunsQ_78TZqy5DVWq0DOSdM-8PseZ5lwtkHnrLFaNAM_1E3pYKN8SmaHias2SJvwa7Ugfn8lYvxvys6Q71vgR5-PULPOWpB0UXjAX46iu6xJwju8cbiQRPlx1lTqg4PytIr6_G6wKOac7jeAp7VhPBtDy3Go_lwQpoyCWTtvIOSWMV0CNIIa5jmzv_Jc6Z4AoKrxDkT1sqcWohTDpQnAijoxBoaURY7ayLkil-gTrEp4BJhrSJjnUvIBfi0NVKxMJWaG0l93jedXKGuP4PVe50JY9Vs__rv7ht04u_Bkz9ofIs65ccO7hyEl_q-ursvm3ecnQ |
link.rule.ids | 310,311,786,790,795,796,802,27956,55107 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zHvSksom_zcGj6ZqmadPjlI1NtyF0g91Gkr7AEDpx3UH_epO2mygevIVAyE_43sv7vvcQujP2YVAtOEkEBCQUJiNSS04kExY_rEXCtVMjjyfRYBY-zfm8ge53WhgAKMln4LlmGcvPVnrjvso6SeTCfmwP7Vuc9-NKrbWl5_hJ5zEdTtOUWwvBkbYC6tUDflROKYGjf4TG2ykrvsirtymUpz9_ZWP875qOUftboodfduBzghqQt1C_ix92snvsKIIfeGVwt47z47QuVoe7ReG09XiZ417FOlyuAU8qSvi6jWb93vRxQOpCCWRp_YOCGBkoH4TmRgeKWQ8oywLJYuBMxtadMEZk1ECUMKAs5kBBxUbTkAaRtSd8JtkpauarHM4QVjLUxjqFjINLXCNk4CdCMS2oy_ym4nPUcmeweKtyYSzq7V_83X2LDgbT8WgxGk6eL9GhuxNHBaHRFWoW7xu4toBeqJvyHr8ADQmf8Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+IEEE+International+Conference+on+Computation+System+and+Information+Technology+for+Sustainable+Solutions+%28CSITSS%29&rft.atitle=A+Behavioral+Study+of+Advanced+Security+Attacks+in+Enterprise+Networks&rft.au=Ashwini+Kumari%2C+M&rft.au=Nandini+Prasad%2C+K+S&rft.date=2021-12-16&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCSITSS54238.2021.9682903&rft.externalDocID=9682903 |