Skip to main content

2017 | OriginalPaper | Buchkapitel

Framework of Cyber Attack Attribution Based on Threat Intelligence

verfasst von : Li Qiang, Yang Zeming, Liu Baoxu, Jiang Zhengwei, Yan Jian

Erschienen in: Interoperability, Safety and Security in IoT

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid growth of information technology, more and more devices are connected to the network. Cyber security environment has become increasingly complicated. In the face of advanced threats, such as targeted attack and advanced persistent threat, traditional security measures of accumulating security devices to protect relevant systems and networks had been proved to be an unqualified failure. Aiming at this situation, this paper proposed a framework of cyber attack attribution based on threat intelligence. At first, after surveying and analyzing related academic research and industry solutions, this paper used the local advantage model to analysis the process of cyber attack. According to the definitions of seven steps in intrusion kill chains and six phases of F2T2EA model, this model proposed a method of collecting threat intelligence data and detecting and response to cyber attacks, so as to achieve the goals of early-warming, processing detection and response and posting attribution analysis, and finally to reverse the security situation. Then, this paper designed a framework of cyber attack attribution based on threat intelligence. The framework is composed by Start of analysis, Threat intelligence and Attribution analysis. The three main parts indicated the architecture of cyber attack attribution. Finally, we tested the framework by practical case. The case study shows that the proposed framework can provide some help in attribution analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Wheeler, D.A., Larsen, G.N.: Techniques for cyber attack attribution. No. IDA-P-3792. Institute for Defense Analyses, Alexandria, VA (2003) Wheeler, D.A., Larsen, G.N.: Techniques for cyber attack attribution. No. IDA-P-3792. Institute for Defense Analyses, Alexandria, VA (2003)
3.
Zurück zum Zitat Ryu, J., Na, J.: Security requirement for cyber attack traceback. In: Fourth International Conference on Networked Computing and Advanced Information Management, NCM 2008, vol. 2. IEEE (2008) Ryu, J., Na, J.: Security requirement for cyber attack traceback. In: Fourth International Conference on Networked Computing and Advanced Information Management, NCM 2008, vol. 2. IEEE (2008)
4.
Zurück zum Zitat Hunker, J., Hutchinson, B., Margulies, J.: Role and challenges for sufficient cyber-attack attribution. In: Institute for Information Infrastructure Protection, pp. 5–10 (2008) Hunker, J., Hutchinson, B., Margulies, J.: Role and challenges for sufficient cyber-attack attribution. In: Institute for Information Infrastructure Protection, pp. 5–10 (2008)
8.
Zurück zum Zitat Tirpak, J.A.: Find, fix, track, target, engage, assess. Air Force Mag. 83(7), 24–29 (2000) Tirpak, J.A.: Find, fix, track, target, engage, assess. Air Force Mag. 83(7), 24–29 (2000)
10.
Zurück zum Zitat Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: Leading Issues in Information Warfare and Security Research, vol. 1, p. 80 (2011) Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: Leading Issues in Information Warfare and Security Research, vol. 1, p. 80 (2011)
11.
Zurück zum Zitat Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. In: Center for Cyber Intelligence Analysis and Threat Research, Hanover, MD (2013) Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. In: Center for Cyber Intelligence Analysis and Threat Research, Hanover, MD (2013)
12.
Zurück zum Zitat Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1-2), 4–37 (2015)CrossRef Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1-2), 4–37 (2015)CrossRef
20.
Zurück zum Zitat Qiang, L., et al.: A reasoning method of cyber-attack attribution based on threat intelligence. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(5), 773–777 (2016) Qiang, L., et al.: A reasoning method of cyber-attack attribution based on threat intelligence. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(5), 773–777 (2016)
Metadaten
Titel
Framework of Cyber Attack Attribution Based on Threat Intelligence
verfasst von
Li Qiang
Yang Zeming
Liu Baoxu
Jiang Zhengwei
Yan Jian
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-52727-7_11