Abstract

Increasing digitization together with the benefits has also brought a lot of problems related to the challenges in cyberspace. Due to the ongoing cyberattacks yearly increase, losses in sectors that are using Telecommunication and IT services are growing. The events of the past 10 years have shown that there are particularly dangerous incidents in the cyberspace, which are pre-planned, well-prepared and carried out by terrorist groups or even by some governments. Pre-planned cyber-attacks have some stages so it is possible to distinguish the early stages where attacks do not bring significant damage to data and information. This article examines the features of the attacks and their characteristics and is the first part of the study's generalization. There is proposed a method for early staged detection of such attacks using a number of the logical filters. Proposed methodology provides a network analysis structure, logical filter configuration and attack detection algorithms that enable the detection of network flow parameters that characterize potential attack vectors. The results of theoretical simulation have shown that proposed method is capable of determining early-staged cyberattacks.In the next paper, the logical mathematical model, an estimation of the sensitivity of such method and assessment of the probability of each initial stage will be presented.DOI: http://dx.doi.org/10.5755/j01.eie.24.3.20981

Highlights

  • Nowadays there are no doubts about the growth of threats in cyberspace

  • There are a lot of works for reducing and evading threats in this space but the apparent extent of threats will only increase due to the imperfection, inappropriate use of traditionally used measures, or even the fact that measures are not used at all

  • In order to demonstrate performance of the method developed for attack detection in early stages the model of the logical circuit representing part of the algorithm was created and the simulation was carried out

Read more

Summary

Introduction

Nowadays there are no doubts about the growth of threats in cyberspace. These threats can critically effect targeted economic sectors (e.g., the Ukrainian power supply system in 2015), general economy (e.g., the Estonian attack in 2007), and political system (e.g., possible US Presidential Election breach in 2016). there are a lot of works for reducing and evading threats in this space but the apparent extent of threats will only increase due to the imperfection, inappropriate use of traditionally used measures, or even the fact that measures are not used at all. Nowadays there are no doubts about the growth of threats in cyberspace. These threats can critically effect targeted economic sectors (e.g., the Ukrainian power supply system in 2015), general economy (e.g., the Estonian attack in 2007), and political system (e.g., possible US Presidential Election breach in 2016). There are proposed 7 attack stages in this work: Reconnaissance; Weaponization; Delivery; Exploitation; Installation; Command and Control; Action on Objectives. This model distinguishes two main stages (Fig. 2): left side of an attacks vector and right side of an attacks vector. If the stage moves to the right, it will be difficult to stop the cyberattack

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.