2022
DOI: 10.1109/tnsm.2022.3183476
|View full text |Cite
|
Sign up to set email alerts
|

PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns

Abstract: Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies' information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies' reputation, privacy, and security, such data is seldom available. This a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…An attack position is a pair (machine, user). This term of attack position was originally proposed in [12] and simply refers to an attacker who has compromised a user account on a machine. The propagation space of an attacker is the set of machines and accounts that he is able to discover and control during the propagation phase.…”
Section: Modeling Paths In a Compromised Networkmentioning
confidence: 99%
“…An attack position is a pair (machine, user). This term of attack position was originally proposed in [12] and simply refers to an attacker who has compromised a user account on a machine. The propagation space of an attacker is the set of machines and accounts that he is able to discover and control during the propagation phase.…”
Section: Modeling Paths In a Compromised Networkmentioning
confidence: 99%