Myths and Misconceptions about Attackers and Attacks

06/10/2021
by   Stjepan Groš, et al.
0

This paper is based on a three year project during which we studied attackers' behavior, reading military planning literature, and thinking on how would we do the same things they do, and what problems would we, as attackers, face. This research is still ongoing, but while participating in applications for other projects and talking to cyber security experts we constantly face the same issues, namely attackers' behavior is not well understood, and consequently, there are a number of misconceptions floating around that are simply not true, or are only partially true. This is actually expected as someone who casually follows news about incidents easily gets impression that attackers and attacks are everywhere and every one is under attack. Our goal in this paper is to debunk these myths, to show what attackers really can and can not, what dilemmas they face, what we don't know about attackers and attacks, etc. The conclusion is that, while attackers do have upper hand, they don't have absolute advantage, i.e. they also operate in an uncertain environment. Knowing this, means that defenses could be well established.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/24/2023

Cyber Deception against Zero-day Attacks: A Game Theoretic Approach

Reconnaissance activities precedent other attack steps in the cyber kill...
research
11/03/2020

Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands

On a regular basis, we read in the news about cyber-attacks on critical ...
research
03/20/2021

Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors

In this work, we address the problem of synthesis of covert attackers in...
research
08/25/2021

Decoys in Cybersecurity: An Exploratory Study to Test the Effectiveness of 2-sided Deception

One of the widely used cyber deception techniques is decoying, where def...
research
09/30/2019

Defense in Depth: The Basics of Blockade and Delay

Given that individual defenses are rarely sufficient, defense-in-depth i...
research
11/29/2022

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers

Choice architecture describes the design by which choices are presented ...
research
07/18/2022

Towards Automated Classification of Attackers' TTPs by combining NLP with ML Techniques

The increasingly sophisticated and growing number of threat actors along...

Please sign up or login with your details

Forgot password? Click here to reset