2015
DOI: 10.1007/978-3-319-22915-7_40
|View full text |Cite
|
Sign up to set email alerts
|

Technical Aspects of Cyber Kill Chain

Abstract: Abstract-Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on organizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder takes to penetrate information systems over time to execute an attack on the target. This paper broadly cate… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
73
0
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 154 publications
(101 citation statements)
references
References 4 publications
(5 reference statements)
0
73
0
4
Order By: Relevance
“…We assume APT scenarios for host intrusion detection: an attacker illegitimately gains access to a system and plans to remain there for an extended period of time without being detected. The attacker may conduct the attack in several phases and use a variety of techniques during each phase [131]. The goal of UNICORN is to detect such attacks at any stage by interpreting the provenance generated by the host.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…We assume APT scenarios for host intrusion detection: an attacker illegitimately gains access to a system and plans to remain there for an extended period of time without being detected. The attacker may conduct the attack in several phases and use a variety of techniques during each phase [131]. The goal of UNICORN is to detect such attacks at any stage by interpreting the provenance generated by the host.…”
Section: Threat Modelmentioning
confidence: 99%
“…To simulate APT attacks, we follow the typical cyber kill chain model that consists of roughly 7 nonexclusive phases, i.e., reconnaissance (identify a target and explore its vulnerabilities), weaponize (design a backdoor and a penetration plan), delivery (deliver the weapon), exploitation (victim triggers the vulnerability), installation (install the backdoor or malware), command and control (C&C) (give remote instructions to the victim), and actions on objectives [131].…”
Section: Supply Chain Attack Scenariosmentioning
confidence: 99%
“…After delivery of the malware, intruders' code should be triggered on the target machine by running the malicious application or exploiting a system vulnerability [20], [23], [31]. A successful exploitation may lead to exfiltration of private information, injection of code into web applications, log keystrokes, steal passwords, steal cookies or download other modules that may perform intended malicious activities.…”
Section: Exploitationmentioning
confidence: 99%
“…This is a mechanism by which a malware registers to its Command and Control (C&C) server [20], [23], [31], [36], [81]. Malware are registering on a C&C domain to receive commands or upload exfiltrated data.…”
Section: Command and Control (C2)mentioning
confidence: 99%
See 1 more Smart Citation