Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2020

01.12.2020

A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice

verfasst von: M. A. Eremeev, I. I. Zakharchuk

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

This paper proposes a technique for improving corporate network audit quality in the course of cyberthreat simulation by enhancing stealth of engagement by minimizing the number of network connections from outside the corporate network.
Literatur
1.
Zurück zum Zitat Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, no. 1. Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, no. 1.
2.
Zurück zum Zitat Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., An approach to building cyber-resistant interactions in the industrial Internet of Things, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 948–953.CrossRef Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., An approach to building cyber-resistant interactions in the industrial Internet of Things, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 948–953.CrossRef
3.
Zurück zum Zitat Zegzhda, D.P. and Pavlenko, E.Y., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159.CrossRef Zegzhda, D.P. and Pavlenko, E.Y., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159.CrossRef
4.
Zurück zum Zitat Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071–1075.CrossRef Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071–1075.CrossRef
5.
Zurück zum Zitat Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.
6.
Zurück zum Zitat Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019, 2019, pp. 317–321. Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019, 2019, pp. 317–321.
7.
Zurück zum Zitat Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34–39. Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34–39.
8.
Zurück zum Zitat Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.CrossRef Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.CrossRef
9.
Zurück zum Zitat Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972–979.CrossRef Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972–979.CrossRef
12.
Zurück zum Zitat The Penetration Testing Execution Standard Documentation, Release 1.1. http://www.pentest-standard.org/ index.php/Post_Exploitation#Purpose. Accessed October 20, 2019. The Penetration Testing Execution Standard Documentation, Release 1.1. http://​www.​pentest-standard.​org/​ index.php/Post_Exploitation#Purpose. Accessed October 20, 2019.
13.
Zurück zum Zitat Egressing Bluecoat with CobaltStike & Let’s Encrypt. https://cybersyndicates.com/2016/12/egressing-bluecoat-with-cobaltstike-letsencrypt/. Accessed October 20, 2019. Egressing Bluecoat with CobaltStike & Let’s Encrypt. https://​cybersyndicates.​com/​2016/​12/​egressing-bluecoat-with-cobaltstike-letsencrypt/​.​ Accessed October 20, 2019.
14.
Zurück zum Zitat Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike. https://www.cyberark.com/threat-research-blog/red-team-insights-https-domain-fronting-google-hosts-using-cobalt-strike/. Accessed October 20, 2019. Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike. https://​www.​cyberark.​com/​threat-research-blog/​red-team-insights-https-domain-fronting-google-hosts-using-cobalt-strike/​.​ Accessed October 20, 2019.
15.
Zurück zum Zitat https://github.com/bluscreenofjeff/bluscreenofjeff.github.io/blob/master/_posts/2017-03-01-how-to-make-communication-profiles-for-empire.md. Accessed October 20, 2019. https://github.com/bluscreenofjeff/bluscreenofjeff.github.io/blob/master/_posts/2017-03-01-how-to-make-communication-profiles-for-empire.md. Accessed October 20, 2019.
16.
Zurück zum Zitat Empire – Modifying Server C2 Indicators. http://threatexpress.com/2017/05/empire-modifying-server-c2-indicators/. Accessed October 20, 2019. Empire – Modifying Server C2 Indicators. http://​threatexpress.​com/​2017/​05/​empire-modifying-server-c2-indicators/​.​ Accessed October 20, 2019.
17.
Zurück zum Zitat Kosenko, M.Yu., A multi-agent system for detecting and blocking botnets by detecting control traffic based on data mining, Cand. Sci. (Eng.) Dissertation, Chelyabinsk, 2017. Kosenko, M.Yu., A multi-agent system for detecting and blocking botnets by detecting control traffic based on data mining, Cand. Sci. (Eng.) Dissertation, Chelyabinsk, 2017.
18.
Zurück zum Zitat Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.CrossRef Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.CrossRef
20.
Zurück zum Zitat Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.CrossRef Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.CrossRef
Metadaten
Titel
A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice
verfasst von
M. A. Eremeev
I. I. Zakharchuk
Publikationsdatum
01.12.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080118

Weitere Artikel der Ausgabe 8/2020

Automatic Control and Computer Sciences 8/2020 Zur Ausgabe

Neuer Inhalt