2017
DOI: 10.1093/cybsec/tyw012
|View full text |Cite
|
Sign up to set email alerts
|

Thinking about intrusion kill chains as mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
2

Year Published

2018
2018
2019
2019

Publication Types

Select...
4
1
1

Relationship

4
2

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 21 publications
0
10
0
2
Order By: Relevance
“…44 For a high-level, strategic introduction to computer security see Shimeall and Spring (2013). 45 See Spring and Hatleback (2017) for a detailed account. the underlying cause, the heuristic is useful for designing effective experimentation.…”
Section: Indexing Beyond the Science Of Computingmentioning
confidence: 99%
“…44 For a high-level, strategic introduction to computer security see Shimeall and Spring (2013). 45 See Spring and Hatleback (2017) for a detailed account. the underlying cause, the heuristic is useful for designing effective experimentation.…”
Section: Indexing Beyond the Science Of Computingmentioning
confidence: 99%
“…One popular model of the steps any adversary must take in a successful attack is the intrusion kill chain (Hutchins et al 2011). Spring and Hatleback (2017) argue that the kill chain can be considered a mechanistic explanation of an attack. The kill chain model decomposes an attack into seven steps, which in this case are most naturally understood as activities.…”
Section: Computer Network Attacks-lockheed Martin's Intrusion Kill Chainmentioning
confidence: 99%
“…The kill chain model avoids the challenge of the changeability of software and adversary responsiveness with a strategy similar in some respects to the criminal Fig. 2 Kill chain diagram, following Spring and Hatleback (2017). Circles are entities, arrows are activities, where delivery (3) can take two paths, one targeting the computer, and another targeting the human (i.e., social engineering such as phishing).…”
Section: Computer Network Attacks-lockheed Martin's Intrusion Kill Chainmentioning
confidence: 99%
“…atak celu. Proces ten równie opisuj Spring, Hatleback (2017) oraz Khan, Siddiqui i Ferens (2018). Natomiast Hahn, Thomas, Lozano, Cardenas (2015) wskazuj na sze faz w tzw.…”
Section: Cykl Ycia Ataku Cybernetycznego W Literaturzeunclassified
“…Zdefiniowany w pracy ogólny cykl ataku wyró nia si od publikowanych w literaturze 17 opisów cyklu ycia ataku cybernetycznego dodanymi dwoma fazami: identyfikacji potrzeb atakuj cego oraz zako czenia ataku. Ponadto, w odró nieniu od dotychczasowego uj cia przez innych badaczy, w przyj tym w pracy cyklu ycia ataku czyn- 17 Coleman, 2012;Hutchinsi in., 2011;Hahn i in., 2015;Spring, Hatleback, 2017 3 3 3 3 3 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 3 3 3 3 3 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 3 3 3 3 3 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 30 60 90 120 150 180 210 240 270 3 3 3 3 3 3 3 3 3 3 3 P7 1 0.75 0.5 0.25 0 3 3 3 3 3 3 3 3 3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 90 180 270 360 450 540 630 720 810 3 3 3 3 3 3 3 3 3 3 3 no ci: a) uruchomienie, b) ewentualna instalacja kodu z o liwego oraz c) dowodzenie, kierowanie i sterowanie wyst puj jako jedna faza. Takie uj cie umo liwia rozwa anie tej w a nie fazy jako wyodr bnionego cyklu ycia, nie trac c jednocze nie ca ego procesu ataku z pola widzenia.…”
Section: Podsumowanieunclassified