2022
DOI: 10.26735/zntl3639
|View full text |Cite
|
Sign up to set email alerts
|

Pivot Attack Classification for Cyber Threat Intelligence

Abstract: The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within the network to accomplish the strategic attack’s objectives. The pivot attack technique is widely used in this context; the attacker creates an indirect communication tunnel with the target and uses traffic forwarding methods to send and receive commands. Recog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 24 publications
(27 reference statements)
0
5
0
Order By: Relevance
“…Despite the rising frequency of attacks involving pivoting, the research on detecting such events it is still scarce or limited in its applicability [22]. Earlier works [3,27] conceptualized pivoting attacks without proposing a detection method.…”
Section: Related Work On Pivoting Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…Despite the rising frequency of attacks involving pivoting, the research on detecting such events it is still scarce or limited in its applicability [22]. Earlier works [3,27] conceptualized pivoting attacks without proposing a detection method.…”
Section: Related Work On Pivoting Detectionmentioning
confidence: 99%
“…Earlier works [3,27] conceptualized pivoting attacks without proposing a detection method. Since pivoting and lateral movement is often a part of APT attacks as carefully studied by Gonzales et al [13] according to the MITRE ATT&CK framework, it was mostly studied in terms of detecting and preventing APT [9,22]. The earliest works focused on alert correlation, not processing raw data.…”
Section: Related Work On Pivoting Detectionmentioning
confidence: 99%
See 3 more Smart Citations