Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomy

PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023(2023)

引用 0|浏览1
暂无评分
摘要
Understanding attackers' behavior is crucial to respond to cyberattacks effectively. Process Mining (PM) is a valuable tool that analyzes runtime events from information systems to discover coordinated tasks to achieve an objective. Our previous research explored using PM to profile attackers, specifically in analyzing low-level system processes' event logs to uncover automated attackers' behavior. In this article, we propose a method that combines PM with the malicious actor behavior taxonomies of the MITRE ATT&CK Framework to discover process models of observed attack strategies. These taxonomies raise the level of abstraction for attacker profiling. We demonstrate this method using a real dataset focused on human behavior, which provides valuable guidelines for future work and enables the development of more effective and adaptable security strategies to combat current cyber threats.
更多
查看译文
关键词
Cybersecurity,process mining,attacker behavior,threat intelligence,MITRE ATT&CK Framework
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要