Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks
نویسندگان
چکیده
Anticipatory cyber defense requires understanding of how cyber adversaries make decisions and adapt as cyberattacks unfold. This paper uses a dataset of qualitative observations conducted at a force on force (“paintball”) exercise held at the 2015 North American International Cyber Summit (NAICS). By creating time series representations of the observed data, a broad range of data mining tools can be utilized to discover valuable verifiable knowledge about adversarial behavior. Two types of such analysis discussed in this work include clustering, which aims to find out what stages show similar temporal patterns, and peak detection for adaptation analysis. Collectively, this mixed methods approach contributes to understanding how adversaries progress through cyberattacks and adapt to any disruptions they encounter.
منابع مشابه
Predicting Adversarial Cyber Intrusion Stages Using Autoregressive Neural Networks
Current approaches to cybersecurity are responsedriven and ineffective as they do not account for dynamic adversarial movement. Using empirical evidence of observations done at two Red Team-Blue Team cybersecurity training exercises held at Idaho National Laboratory (INL) and the Michigan Cyber Range, this paper predicts how adversaries move during cyberattacks. In this study, a framework for t...
متن کاملCybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention
A connected vehicle (CV) environment is composed of a diverse data collection, data communication and dissemination, and computing infrastructure systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from connected vehicle applications. As cyberattacks can lead...
متن کاملCybersecurity Challenges to American State and Local Governments
In this paper, we examine cybersecurity challenges to American state and local governments. In particular, we address the extent and magnitude of cyberattacks against these governments, the problems these governments face in preventing attacks from being successful, the barriers internal to their organizations that make cybersecurity difficult to achieve, and actions that they believe should be...
متن کاملPrivacy Spatial and Temporal Distances in Nomadic Settelments
Human always in interaction with their social environment, have consider some degree of privacy with different purposes, for themselves, the people around them and carry out their activities. Creating privacy depends on two elements; subjective meanings that ruling the creation of privacy, and the second sentence are person available facilities. Privacy is not seen, heard, smelled and availabil...
متن کاملSpatiotemporal Patterns and Predictability of Cyberattacks
A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017