Tecnicas Avanzadas de Ciberseguridad: Integracion y Evolucion de la Kill Chain en Diversos Escenarios

06/03/2023
by   Juan Diego Bermudez, et al.
0

The document provides an in-depth analysis of the main attack chain models used in cybersecurity, including the Lockheed Martin Cyber Kill Chain framework, the MITER ATT CK framework, the Diamond model, and the IoTKC, focusing on their strengths and weaknesses. Subsequently, the need for greater adaptability and comprehensiveness in attack analysis is highlighted, which has led to the growing preference for frameworks such as MITRE ATT CK and the Diamond model. A review of insider attacks in cloud computing shows how the combination of attack trees and kill chains can offer an effective methodology to identify and detect these types of threats, focusing detection and defense efforts on critical nodes. Likewise, emphasis is placed on the importance of advanced analysis models, such as BACCER, in the identification and detection of attack patterns and decision logic using intelligence techniques and defensive and offensive actions.

READ FULL TEXT
research
06/21/2022

Identification of Attack Paths Using Kill Chain and Attack Graphs

The ever-evolving capabilities of cyber attackers force security adminis...
research
11/22/2017

Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack

The Denial-of-service (DoS) attack is considered one of the largest thre...
research
09/03/2019

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense

Security is one of the most relevant concerns in cloud computing. With t...
research
08/11/2020

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

It is becoming more common that adversary attacks consist of more than a...
research
10/06/2021

A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version

Attack trees and attack graphs are both common graphical threat models u...
research
04/28/2020

Parasite Chain Detection in the IOTA Protocol

In recent years several distributed ledger technologies based on directe...
research
10/31/2022

Do You Really Need to Disguise Normal Servers as Honeypots?

A honeypot, which is a kind of deception strategy, has been widely used ...

Please sign up or login with your details

Forgot password? Click here to reset