2019
DOI: 10.1016/j.future.2019.01.022
|View full text |Cite
|
Sign up to set email alerts
|

A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
36
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(37 citation statements)
references
References 17 publications
1
36
0
Order By: Relevance
“…[ 70 ] and Noor U. et al. [ 50 , 71 ]confirm that the TTP's of the attacker remains consistent over a period of time. This allows greater confidence in the predictability of the lower level indicators of attack.…”
Section: Threat Modellingmentioning
confidence: 96%
“…[ 70 ] and Noor U. et al. [ 50 , 71 ]confirm that the TTP's of the attacker remains consistent over a period of time. This allows greater confidence in the predictability of the lower level indicators of attack.…”
Section: Threat Modellingmentioning
confidence: 96%
“…Noor et al [45] presented a machine learning framework for investigating data breaches based on common patterns from threat repositories. The framework reasons on security incidence by mapping low-level threat artifacts to high-level adversary tactics, techniques, and procedures in a way that machines can identify these connections with certain probabilities.…”
Section: A Security Model Automation For Red Team and Blue Teammentioning
confidence: 99%
“…The case studies are used build the profiles of the APT actors by analyzing their motivations and to group in them category. [12,15]Also, Tactics Technique and Procedure (TTP) is enabled to identify the skill levels, fixing the target as geographic, opportunistic, stealthy behavior. Based on the resources available with attacker attribution and objectives will be affixed.…”
Section: Threat Actormentioning
confidence: 99%
“…The least effort to adapt is significantly more. [13,15] The successful launch of the trivial for file hash and Internet Protocol (IP) address. while it climbs up towards apex the TTPs effort needed to adapt is Table III, shows that the Indicator of compromise (IOC) acts as an attack patterns of malware and .…”
Section: Cyber Kill Chain (Ckc)mentioning
confidence: 99%
See 1 more Smart Citation