Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3423355
|View full text |Cite
|
Sign up to set email alerts
|

Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…The work in [10] extracted causal dependencies within alerts generated by EDR systems to reconstruct attacks. The authors of [32] collected causality logs from browsers' execution history to detect watering hole attacks. Additionally, the study [9] correlated provenance from individual hosts to create an enterprise-wide causal graph for locating APTs at the enterprise level.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The work in [10] extracted causal dependencies within alerts generated by EDR systems to reconstruct attacks. The authors of [32] collected causality logs from browsers' execution history to detect watering hole attacks. Additionally, the study [9] correlated provenance from individual hosts to create an enterprise-wide causal graph for locating APTs at the enterprise level.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%
“…To detect complex watering hole attacks, which are common in the initial stage of APT attacks, the authors developed MNEMOSYNE [32], a postmortem forensic analysis engine. MNEMOSYNE accurately reconstructs, investigates, and assesses the ramifications of watering hole attacks with little modification to the browser.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…[44][45][46] Cybercrime Criminal activity either targets or uses a computer, a computer network, or a networked device. [47,48] Malware Malicious software designed to infiltrate a device without knowledge [49,50] DDoS Denial of service attack on a computer system or network that causes a service or resource tobe inaccessible to legitimate users [51][52][53][54][55] Ransomware A type of malicious program that restricts access to certain parts of files of the infected operating system and demands a ransom in exchange for removing this restriction [56][57][58][59][60] Mobile malware Its name suggests malicious software that targets explicitly the operating systems on mobile phones [61][62][63][64] Watering hole Refers to a tactic used during targeted attack campaigns where the APT is distributed through a trusted website that is usually visited by employees of the target company or entity [65,66] We contrasted this result with an international organization related to cybersecurity. We found that some of them were considered the most relevant cyberattacks in the year 2020, according to The European Union Agency for Cybersecurity (ENISA) [34].…”
Section: Type Description Referencementioning
confidence: 99%