Towards an Efficient Detection of Pivoting Activity

Logo poskytovatele

HUSÁK Martin APRUZZESE Giovanni YANG Shanchieh WERNER Gordon

Rok publikování 2021
Druh Článek ve sborníku
Konference 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Fakulta / Pracoviště MU

Ústav výpočetní techniky

Klíčová slova Pivoting;Lateral Movement;Machine Learning;Flow Inspection;Intrusion Detection
Přiložené soubory
Popis Pivoting is a technique used by cyber attackers to exploit the privileges of compromised hosts in order to reach their final target. Existing research on countering this menace is only effective for pivoting activities spanning within the internal network perimeter. When applying existing methods to include external traffic, the detection algorithm produces overwhelming entries, most of which unrelated to pivoting. We address this problem by identifying the major characteristics that are specific to potentially malicious pivoting. Our analysis combines human expertise with machine learning and is based on the inspection of real network traffic generated by a large organization. The final goal is the reduction of the unacceptable amounts of false positives generated by the state of the art methods. This paper paves the way for future researches aimed at countering the critical menace of illegitimate pivoting activities.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.

Další info