Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach

05/03/2019
by   Pin-Yu Chen, et al.
0

Lateral movement attacks are a serious threat to enterprise security. In these attacks, an attacker compromises a trusted user account to get a foothold into the enterprise network and uses it to attack other trusted users, increasingly gaining higher and higher privileges. Such lateral attacks are very hard to model because of the unwitting role that users play in the attack and even harder to detect and prevent because of their low and slow nature. In this paper, a theoretical framework is presented for modeling lateral movement attacks and for proposing a methodology for designing resilient cyber systems against such attacks. The enterprise is modeled as a tripartite graph capturing the interaction between users, machines, and applications, and a set of procedures is proposed to harden the network by increasing the cost of lateral movement. Strong theoretical guarantees on system resilience are established and experimentally validated for large enterprise networks.

READ FULL TEXT
research
01/24/2022

DDoSDet: An approach to Detect DDoS attacks using Neural Networks

Cyber-attacks have been one of the deadliest attacks in today's world. O...
research
05/27/2021

Hopper: Modeling and Detecting Lateral Movement (Extended Report)

In successful enterprise attacks, adversaries often need to gain access ...
research
07/02/2021

Reinforcement Learning for Feedback-Enabled Cyber Resilience

The rapid growth in the number of devices and their connectivity has enl...
research
04/01/2020

Phishing Attacks: Detection And Prevention

This paper aims to provide an understanding of what a phishing attack is...
research
08/29/2022

Lateral Movement Detection Using User Behavioral Analysis

Lateral Movement refers to methods by which threat actors gain initial a...
research
08/04/2022

Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework

In recent cyber attacks, credential theft has emerged as one of the prim...
research
09/30/2018

Cyber Insurance

This chapter will first present a principal-agent game-theoretic model t...

Please sign up or login with your details

Forgot password? Click here to reset