DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Ontology Generation of Advanced Persistent Threats and their Automated Analysis


Article Information

Title: Ontology Generation of Advanced Persistent Threats and their Automated Analysis

Authors: Zafar Iqbal, Zahid Anwar

Journal: NUST Journal of Engineering Sciences

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
Y 2016-02-29 2019-12-19
Y 2015-03-12 2016-02-28

Publisher: National University of Sciences & Technology, Rawalpindi/Islamabad (NUST)

Country: Pakistan

Year: 2016

Volume: 9

Issue: 2

Language: en

DOI: 10.24949/njes.v9i2.283

Categories

Abstract

Advance Persistent Threats (APTs) are a continuous hacking process during which the perpetrator changes signatures and uses different malware to launch an attack. For these reasons most of the time APTs remain undetected by the conventional IDSs. Ironically a large amount of data is available regarding APTs in literature and online repositories. However, due to high adaptivity and large volume of data, analyzing information about APT incidents is challenging for security analysts. Several security models have been proposed for analysis and understanding of the APTs. In this regard, two recent approaches: Cyber Kill Chain (CKC) and Pyramid of Pain (POP) are noteworthy. CKC is an attacker model while POP is a defender model. If these approaches are combined into a suitable defense framework, then these can be used as an early warning system against APTs. The contributions of this paper are two-fold. The first is development of  CKC and POP’s standalone ontologies, identifying relationships between these and developing a common ontology of APTs. Secondly, we propose a novel framework “APTs Analysis and Classification System – A2CS”  which uses semantic rules for automatic analysis of APTs such as identification of their missing artifacts and inferencing of the Tactics, Techniques and Procedures being employed.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...