2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS) 2016
DOI: 10.1109/srds.2016.014
|View full text |Cite
|
Sign up to set email alerts
|

Lateral Movement Detection Using Distributed Data Fusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The problem is that expert attackers can easily evade similar defensive schemes by acting differently from the expected model. The detection algorithm proposed by Fawaz et al [29] requires analyses of huge amounts of host-based logs, which are hard to collect in large organization and may be easily altered by attackers because we remark that they control the hosts of the pivoting tunnel. Unlike these proposals, we consider network flows because they are easier to collect and store; moreover, our analysis requires less processing costs than investigations carried out on raw traffic data [20].…”
Section: Related Workmentioning
confidence: 99%
“…The problem is that expert attackers can easily evade similar defensive schemes by acting differently from the expected model. The detection algorithm proposed by Fawaz et al [29] requires analyses of huge amounts of host-based logs, which are hard to collect in large organization and may be easily altered by attackers because we remark that they control the hosts of the pivoting tunnel. Unlike these proposals, we consider network flows because they are easier to collect and store; moreover, our analysis requires less processing costs than investigations carried out on raw traffic data [20].…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we considered the threat due to lateral movement by an attacker. Advanced Persistent Threats (APT) [17] are severe and long-lasting cyber attacks, where lateral movement is an attack phase in which the attacker moves from the compromised devices to other devices [18] [19]. APT can be defined as the theft of intellectual property or espionage as opposed to achieving immediate financial gain and are prolonged, stealthy attacks [20] [21] .…”
Section: B Threat Modelmentioning
confidence: 99%
“…Another important distinction is that this work uses real-world enterprise authentication graphs, while most prior work has not. [14,16,19,7]. Latte [14], a graph based detection framework, discovers potential lateral movement in a network using forensic analysis of known infected computers.…”
Section: Background and Our Differencesmentioning
confidence: 99%