2022
DOI: 10.1155/2022/1699657
|View full text |Cite
|
Sign up to set email alerts
|

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Abstract: In the past, phishing techniques were a common means of attack carried out by individuals or small groups via spam mail on a randomly selected target. However, in recent years, phishing techniques have been adopted by advanced persistent threat (APT) groups to attack organizations such as the Sony Pictures Enterprise and Korea Hydro & Nuclear Power. As such, our study aims to analyze the past campaigns conducted by the APT groups. We aim to propose a countermeasure that corresponds to the phishing campaign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 25 publications
1
3
0
1
Order By: Relevance
“…In other words, several classes that, even intuitively, are expected to be disjoint are not disjoint, including DIGITAL ARTIFACT and PHYSI-CAL ARTIFACT (for example, HARDWARE DEVICE), PHYSICAL OBJECT and DIGITAL OBJECT, DIGITAL ARTIFACT and DIGITAL EVENT, PHYSICAL LOCATION and PHYS-ICAL OBJECT, among others. Actually, similar issues have been found in other large ontologies, such as Schema.org 11 , where, for example, LOCALBUSINESS is both a PLACE and an ORGANIZATION 12 . In this case specifically, under UFO assumptions, ORGANI-ZATION and PLACE can be seen as different OBJECTS with different unique principles of identity, so they cannot be a subtype of one another [32,2].…”
Section: General Semantic Issues Within D3fendsupporting
confidence: 57%
See 2 more Smart Citations
“…In other words, several classes that, even intuitively, are expected to be disjoint are not disjoint, including DIGITAL ARTIFACT and PHYSI-CAL ARTIFACT (for example, HARDWARE DEVICE), PHYSICAL OBJECT and DIGITAL OBJECT, DIGITAL ARTIFACT and DIGITAL EVENT, PHYSICAL LOCATION and PHYS-ICAL OBJECT, among others. Actually, similar issues have been found in other large ontologies, such as Schema.org 11 , where, for example, LOCALBUSINESS is both a PLACE and an ORGANIZATION 12 . In this case specifically, under UFO assumptions, ORGANI-ZATION and PLACE can be seen as different OBJECTS with different unique principles of identity, so they cannot be a subtype of one another [32,2].…”
Section: General Semantic Issues Within D3fendsupporting
confidence: 57%
“…D3FEND's primary goal is to help to standardize the vocabulary used to describe defensive cybersecurity technology functionality. A number of recent cybersecurity studies make use of it for the process of identification and assessment of cyber threats, and response against them [10,11,12,13,14], among other applications, including the design of a game to support security education and risk assessment [15]. D3FEND is also an example of an ontology developed without an explicit tie to an upper ontology, and to the best of our knowledge, there is no systemic ontological analysis of this artifact, whose validity seems to be taken for granted.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Para cada una de las técnicas, MITRE proporciona información sobre posibles mecanismos para su detección y/o mitigación. Estudios recientes como (Xiong et al, 2022), (Liu, Wang y Chen, 2022) y (Shin et al, 2022) también basan sus soluciones en estas matrices.…”
Section: Introductionunclassified
“…Since TTP information is a simple string, the embedding process is required to use it for training. Previous studies have used very simple embeddings such as onehot vectorization [3], [10]. Although they tried to reflect tactical information in the vectorization process, this approach has the limitation that it does not reflect any statistical information of TTP data.…”
mentioning
confidence: 99%