2022
DOI: 10.1016/j.iswa.2022.200106
|View full text |Cite
|
Sign up to set email alerts
|

Role-based lateral movement detection with unsupervised learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 53 publications
0
6
0
Order By: Relevance
“…The proposed approach relies on Net-Flow data collected on the pivot and, thus, it is a de-facto host-based method, even though network-based data are used. Powell [20] proposed a role-based lateral movement detection using unsupervised learning, utilizing systems calls and network connections alike, leveraging earlier work on graph-based anomaly detection in authentication logs [19]. Smiliotopoulos et al [24] propose a Sysmon log-based lateral movement detection technique encompassing the labelling and pre-processing of the data, as well as the classification through a supervised machine learning approach.…”
Section: Related Work On Pivoting Detectionmentioning
confidence: 99%
“…The proposed approach relies on Net-Flow data collected on the pivot and, thus, it is a de-facto host-based method, even though network-based data are used. Powell [20] proposed a role-based lateral movement detection using unsupervised learning, utilizing systems calls and network connections alike, leveraging earlier work on graph-based anomaly detection in authentication logs [19]. Smiliotopoulos et al [24] propose a Sysmon log-based lateral movement detection technique encompassing the labelling and pre-processing of the data, as well as the classification through a supervised machine learning approach.…”
Section: Related Work On Pivoting Detectionmentioning
confidence: 99%
“…The vulnerabilities in IoT device services can lead to lateral movement attacks to compromise other IoT devices through remote attacks. Some of those attacks might be stealthy and can go undetected when their generated traffic fits into accepted categories [34], [35]. To address those attacks, in CMXsafe, the services forwarded to the CMX-GW are only accessible by devices and platforms that are previously authenticated and have enabling SCs for communications, limiting the risk of anonymous fuzzy/injection attacks [36].…”
Section: Secure Communication Path Establishment (P3)mentioning
confidence: 99%
“…Moreover, 6 out of 9 works included k-fold cross validation (all with 10 folds) as a precaution step for avoiding overfitting. Additionally, the majority of the contributions employ an imbalanced dataset, whereas each one of the works [15,17,7] incorporate balanced traffic. Nevertheless, it is generally accepted that the imbalanced nature of real-life log-based traffic is the basic principle that governs real-world scenarios.…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Anomaly detection was conducted on the application layer network traffic of data centers via the Jaccard Similarity Coefficient and clustering measurement technique (JSCC) on several balanced datasets. On the other hand, the authors in [17] presented an unsupervised learning model of LM detection, based on the rolebased approach of clustering the system connections to remote hosts into distinct roles. We argue, that the type of traffic, and therefore the features obtained in both the environments of [16] and [17], are significantly different compared to this study.…”
Section: Unsupervised Learning Based Schemesmentioning
confidence: 99%
See 1 more Smart Citation