2019 International Conference on Computational Science and Computational Intelligence (CSCI) 2019
DOI: 10.1109/csci49370.2019.00023
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Operational Phases of APT Campaigns

Abstract: In the context of Advanced Persistent Threat (APT) attacks, this paper introduces a model, called Nuke, which tries to provide a more operational reading of the attackers' lifecycle in a compromised network. It allows to consider the notions of regression; and repetitiveness of final objectives achievement. By confronting this model with examples of recent attacks (Equifax data breach and TV5Monde sabotage), we emphasize the importance of the attack chronology in the Cyber Threat Intelligence (CTI) reports, as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Studies on APT attack detection have typically focused predominantly on signature-, graph-, and machine learning-based detection methods. Berady et al [8] proposed a Nuke model in which the APT attack lifecycle was defined as a state machine. This model consists of exploration, exploitation, and decision-making phases.…”
Section: Apt Attack Detection and Responsementioning
confidence: 99%
“…Studies on APT attack detection have typically focused predominantly on signature-, graph-, and machine learning-based detection methods. Berady et al [8] proposed a Nuke model in which the APT attack lifecycle was defined as a state machine. This model consists of exploration, exploitation, and decision-making phases.…”
Section: Apt Attack Detection and Responsementioning
confidence: 99%
“…This choice was motivated by the fact that we wanted to observe participants' behavior during the Network Propagation phase. Thus, some tactics (i.e., stages of kill chains) were not applicable because attackers used these tactics to reach their goals during earlier or later operational phases [23], for example Reconnaissance, Initial Access, Asset Dominance, and even those related to the victim's Network Exploitation phase in order to achieve final objective.…”
Section: B Deploymentmentioning
confidence: 99%
“…When the attacker has compromised at least one component of the targeted network, he is able to apply attack procedures inside it. Here begins the Network Propagation phase [8].…”
Section: A Actions Of the Attackermentioning
confidence: 99%
“…a) Need for unified views: Gianvecchio et al [11] point out the semantic gap between the defender and the attacker. Indeed, the attacker operates at the level of strategy and tactics; he focuses on target discovery, and can deploy various kill chains tactics [8,12]. However, the defender spends significant time processing low-level, rule-generated alerts and singlelog analysis can hardly reveal the complete attack story for complex, multi-stage attacks.…”
Section: Related Workmentioning
confidence: 99%