2020
DOI: 10.1109/tetc.2017.2764885
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Threat Prioritization of Pivoting Attacks in Large Networks

Abstract: Several advanced cyber attacks adopt the technique of "pivoting" through which attackers create a command propagation tunnel through two or more hosts in order to reach their final target. Identifying such malicious activities is one of the most tough research problems because of several challenges: command propagation is a rare event that cannot be detected through signatures, the huge amount of internal communications facilitates attackers evasion, timely pivoting discovery is computationally demanding. This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
31
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(35 citation statements)
references
References 29 publications
4
31
0
Order By: Relevance
“…We put more emphasis on small increments because not only they are easier to introduce, but they also yield samples that are more similar to their "original" variant (which is a typical characteristic of adversarial perturbations [9]). Furthermore, increasing some of these features by higher amounts may trigger external defensive mechanisms based on anomaly detection [59], or may generate incorrect flows (e.g.,: some flow collectors [70] have flow upper duration limits of 120 s [71]). The complete breakdown of the operations performed to generate our adversarial datasets is provided in Algorithm 1, in which an adversarially manipulated input is denoted through the A(•) operator.…”
Section: Generation Of Adversarial Samplesmentioning
confidence: 99%
“…We put more emphasis on small increments because not only they are easier to introduce, but they also yield samples that are more similar to their "original" variant (which is a typical characteristic of adversarial perturbations [9]). Furthermore, increasing some of these features by higher amounts may trigger external defensive mechanisms based on anomaly detection [59], or may generate incorrect flows (e.g.,: some flow collectors [70] have flow upper duration limits of 120 s [71]). The complete breakdown of the operations performed to generate our adversarial datasets is provided in Algorithm 1, in which an adversarially manipulated input is denoted through the A(•) operator.…”
Section: Generation Of Adversarial Samplesmentioning
confidence: 99%
“…Furthermore, when simulating attacks at the feature-space it is also needed to check that all inter-dependencies between features are maintained, and that the feature values of the perturbed samples do not result in impossible numbers: for example, the size of a TCP packet cannot exceed 64KBytes, while some network flow collectors have fixed thresholds for the maximum flow duration [14,71].…”
Section: Realistic Evaluation Of Existing Attacksmentioning
confidence: 99%
“…A common technique used by APT to overcome connectivity restrictions imposed by firewalls or to access different network segments is the Pivot attack. Apruzzese et al [28] described the first flow-based pivoting detection algorithm, which uses temporal graph-analytics techniques to detect the attacks and prioritise detection results based on a scoring system. The same authors defined the pivot attack as a command propagation tunnel created among three or more internal hosts to control a specific target.…”
Section: Pivotingmentioning
confidence: 99%
“…However, it is essential that we compare our detection scheme with prior research effort in this area. Table II To the best of our knowledge, [28] is the first paper that specifically addresses pivoting by introducing an attack detection method. However, authors in [30] stated that the approach is not feasible to detect pivot attacks in enterprise networks when considering internal and external connections.…”
Section: E Related Workmentioning
confidence: 99%