Auflistung nach Schlagwort "cyber security"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelExtracting network based attack narratives through use of the cyber kill chain: A replication study(it - Information Technology: Vol. 64, No. 1-2, 2022) Weathersby, Aaron; Washington, MarkThe defense of a computer network requires defenders to both understand when an attack is taking place and understand the larger strategic goals of their attackers. In this paper we explore this topic through the replication of a prior study “Extracting Attack Narratives from Traffic Datasets” by Mireles et al. [Athanasiades, N., et al., Intrusion detection testing and benchmarking methodologies, in First IEEE International Workshop on Information Assurance. 2003, IEEE: Darmstadt, Germany]. In their original research Mireles et al. proposed a framework linking a particular cyber-attack model (the Mandiant Life Cycle Model) and identification of individual attack signatures into a process as to provide a higher-level insight of an attacker in what they termed as attack narratives. In our study we both replicate the original authors work while also moving the research forward by integrating many of the suggestions Mireles et al. provided that would have improved their study. Through our analysis, we confirm the concept that attack narratives can provide additional insight beyond the review of individual cyber-attacks. We also built upon one of their suggested areas by exploring their framework through the lens of Lockheed Martin Cyber Kill Chain. While we found the concept to be novel and potentially useful, we found challenges replicating the clarity Mireles et al. described. In our research we identify the need for additional research into describing additional components of an attack narrative including the nonlinear nature of cyber-attacks and issues of identity and attribution.
- TextdokumentSemi-Formal Representation and Evaluation of Security Properties(INFORMATIK 2017, 2017) Lou, Xinxin; Zid, Ines Ben; Parekh, Mithil; Gao, YuanIn life-critical and safety-critical systems, one small fault can lead to huge financial and personal damages. How to reduce system failure is an important question for engineers. After the software crisis, formal methods were proposed, which have been proved to effectively reduce the risk of failure. However, the formal method is somehow not as popular as expected, because it is not easy to master, and furthermore, lacks sufficient tools to support this method. In contrast, semi-formal method as a model-driven way is widely used in industry. In this paper, we attempt to apply an application of the semi-formal method to reduce security vulnerabilities of industrial systems. Furthermore, using CSlang, different Information Security Indicators (ISI) can be represented for Industrial Automation and Control Systems (IACS).
- MagazinartikelServiceorientierte Cyberattacken(.inf: Vol. 1, No. 2, 2023) Resch, Alexandra; Münch, Isabel; Meier, MichaelDie Zeiten der holprig getexteten Erpresserschreiben sind vorbei. Heute gehen Kriminelle bei Cyberattacken sehr userfreundlich vor. Was das für die Bekämpfung bedeutet und wie Betroffene im Ernstfall reagieren sollten, diskutieren Isabel Münch vom Bundesamt für Sicherheit in der Informationstechnik (BSI) und Prof. Dr. Michael Meier, Inhaber des Lehrstuhls für IT-Sicherheit am Institut für Informatik der Universität Bonn.