MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) 2018
DOI: 10.1109/milcom.2018.8599852
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…At the same time, there exist works that combine graph-based and time-based methods, however, they deal with specific use case of threat intelligence. For instance, Garcia-Lebron et al [5], although, considered both the graph-based and time-based aspects of the relations, their proposed framework is tailored to the use case of detecting reconnaissance behaviour of cyber attacks and may not be applicable to other scenarios. To the best of our knowledge, no other work has explored the combination of graph-based and time-based methods in a generic framework that also prioritises modularity and the ability to support general ML techniques.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At the same time, there exist works that combine graph-based and time-based methods, however, they deal with specific use case of threat intelligence. For instance, Garcia-Lebron et al [5], although, considered both the graph-based and time-based aspects of the relations, their proposed framework is tailored to the use case of detecting reconnaissance behaviour of cyber attacks and may not be applicable to other scenarios. To the best of our knowledge, no other work has explored the combination of graph-based and time-based methods in a generic framework that also prioritises modularity and the ability to support general ML techniques.…”
Section: Related Workmentioning
confidence: 99%
“…A rough, qualitative distinction can be made between features and beliefs in that the former represent raw intelligence whereas the latter represent "business-grade"-i.e., actionable-intelligence 5. Note that b need not add up to unity since the threats may overlap.…”
mentioning
confidence: 99%
“…Many cybersecurity datasets can be represented by graph time series. A concrete example is the reconnaissance behaviors of cyber attackers, which can be represented as a time series of bipartite graphs [139,39], which reflects one particular kind of the aforementioned attack-defense structure G(t) = (V (t), E(t)) over time t. For studying such time series of graphs, a systematic methodology is presented in [39]. At a high level, the methodology is to characterize the evolution (i.e., time series) of the similarity between two adjacent graphs G(t) and G(t+1), where the notion of similarity can have many different definitions (leading to various kinds of analyses).…”
Section: Datamentioning
confidence: 99%