2013 IEEE International Conference on Intelligence and Security Informatics 2013
DOI: 10.1109/isi.2013.6578801
|View full text |Cite
|
Sign up to set email alerts
|

A graph analytic metric for mitigating advanced persistent threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…For example, Chapman et al [25] simulate pivoting-based attacks through a gametheoretic framework and propose some best practices based on their observations. Johnson et al [26] present an original graph metric that quantifies whether granting a certain privilege to an employee may increase chances of pivoting in Windows domains.…”
Section: Related Workmentioning
confidence: 99%
“…For example, Chapman et al [25] simulate pivoting-based attacks through a gametheoretic framework and propose some best practices based on their observations. Johnson et al [26] present an original graph metric that quantifies whether granting a certain privilege to an employee may increase chances of pivoting in Windows domains.…”
Section: Related Workmentioning
confidence: 99%
“…In the research of Johnson et al [18], the authors proposed a novel graph analytic metric that can be used to measure the potential vulnerability of a cyber network to specific types of attacks that use lateral movement and privilege escalation, such as the well-known Pass the Hash, (PTH). The metric can be calculated dynamically from the authorization and auditing layers during the network security authorization phase and will potentially enable predictive de terrence against attacks, such as PTH.…”
Section: Existing Apt Detection Methodsmentioning
confidence: 99%
“…In some cases, the introduced methods and tools are not complete, meaning that they may only be able to detect the vulnerability of the environment or network and not be able to detect the attack in the environment, as in [25] that Johnson and Hogan have proposed a method to investigate whether the network environment is vulnerable to an APT attack or not. This tool allows the network security administrators to check the vulnerability of the network environment after initial configuration and then make changes if necessary.…”
Section: Literature Reviewmentioning
confidence: 99%