Towards an Efficient Detection of Pivoting Activity

Investor logo
Authors

HUSÁK Martin APRUZZESE Giovanni YANG Shanchieh WERNER Gordon

Year of publication 2021
Type Article in Proceedings
Conference 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)
MU Faculty or unit

Institute of Computer Science

Citation
Web https://ieeexplore.ieee.org/document/9464033
Keywords Pivoting;Lateral Movement;Machine Learning;Flow Inspection;Intrusion Detection
Attached files
Description Pivoting is a technique used by cyber attackers to exploit the privileges of compromised hosts in order to reach their final target. Existing research on countering this menace is only effective for pivoting activities spanning within the internal network perimeter. When applying existing methods to include external traffic, the detection algorithm produces overwhelming entries, most of which unrelated to pivoting. We address this problem by identifying the major characteristics that are specific to potentially malicious pivoting. Our analysis combines human expertise with machine learning and is based on the inspection of real network traffic generated by a large organization. The final goal is the reduction of the unacceptable amounts of false positives generated by the state of the art methods. This paper paves the way for future researches aimed at countering the critical menace of illegitimate pivoting activities.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info