Review of Multistage Cyber Attack: International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Review of Multistage Cyber Attack: International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Abstract— with the increasing use of internet and penetration followed by the removal of it’s traces, then
networking devices, threat of the cyber attacks is also searching of the victim’s data to be manipulated or attack.
increasing. Group of specialist hackers are been higher by These long Term Attacks with heavy damage are called as
states and criminal organizations to spoil and steel the data Advanced Persistent Attacks(ATP). Big Organizations like
of organizations. With the increase in the security systems, “Google” which have huge data bases are investing a lot in
attackers have also come up with the new techniques and their security system but still many of them suffer from these
methods. Most affective and long term attack methodology attacks. Even if any single step gets failed then the whole
at present is Multi Stage attacks which comprises of many attack may fail. But the attackers use these attacks quite
sequential sub attacks at different levels. Each sub Attack proficiently. Hence has caused huge monitory and data loss to
has a specific task to perform. Multi Stage attack includes industry, people and nation.
penetration followed by the removal of its traces, then
searching of the victim’s data to be manipulated or attack II. MULTI STAGE ATTACK PATTERN
and then performing main task. These long Term Attacks Today cyber attackers are incorporating different and
are also termed as Advanced Persistent Attack (ATP). advanced methodology in their attacks. Therefore,
Organizations are investing a lot in their security system professional cyber analysts are being higher for monitoring the
but still 95 % of them are the victims of these attacks. attack. Analysts see the attack according to its affect on the
To tackle this type of attacks a simulation system network. But, more information is there in its sub attacks. So,
can be implemented in which these attacks can be To tackle multi stage attacks analysts are working on the
implemented and then studied. With that study, data can attack patterns of multi stage attack, patterns of sub attacks.
be generated which can be used for mapping of different With these attack patterns real big picture of attack can be
types of Multi Stage attacks. This mapping is done by predicted.
analyzing the network abnormal behavior if there is any.
Few Attacks that are the part of multi stage attack are:-
Keywords— Multi Stage Attack, Advanced Persistent Attack,
Call of Action
Penetration, Clustering and Cyber Attacks.
Recruitment
Intelligence Gathering
I. INTRODUCTION
Increasing use of internet and network devices, threat of Vulnerability Scanning
the cyber attacks is increasing. As the most of the devices are Defacement
open into the network with not much of security, there is
always the chance of security Breach. Crackers and Hackers Steal Information
(Black Hats) are been higher by criminal organizations to spoil Mass DOS Attack
the data of legitimate organizations. Most effective attack
technique now a days are DDoS and multi stage attacks which
III. APPROACHES TO TACKLE
itself comprises of many sub attacks. Each sub Attack has a
specific and fixed task to perform. First step of Multi Stage is a. In [1], Clark D.D et al discusses the reason for network
level personal attribution is of very limited forensic
International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Published Online June – July 2015 in IJEAST (http://www.ijeast.org/)
importance. He analyzes and focuses on the different better detection of Multistage Attacks and this way
types of attacks based on internet, and observes the role system can be made more robust.
and performance of currently available alternatives to
attribution plays in preclusion and prosecution. We can’t
design the Network system again because it will cost very
a lot. So, instead of alternating the network system focus
should be on other approaches, like as making multi stage
cyber attacks more difficult, resource consuming and
costly. And, instead of issuing the calls for better
attribution on the network, such applications should be
designed that can do better job of integrating identity.
Algorithm:
accepted which will set up the alert correlation which can from some legitimate user or from some attacker. In the
result in attack. This way the number of alerts can be beginning the system will be in the learning stage to know
decreased. Sequential mining algorithm is used to find out the resources accessed by the users and then later creating
the attack pattern. To improve the efficiency of this the graph of Ip addresses against the Hop Count. Based
methodology, the candidate verification that calculates on this chart system can differentiate valid user and
alert correlativity while generating candidate attack attacker.
sequence should is done .
combinations the attacks can be identified and then [8] F. A Bahareth, O. O. Bamasak, “Constructing Attack
tackled within the time with least possible loss. Scenario Using Sequential Pattern Mining with Correlated
Candidate Sequences”, ACM, 2013.
[9] H. Wang, C. Jin, K. G. Shin, “Defense Against Spoofed IP
V. CONCLUSION
Traffic Using Hop-Count Filtering”, IEEE/ACM, 2007.
On the basis of above discussion conclusion can be made that [10] S. Xin, X. Chen, H. Tang, N. Zhu, “Research on DoS
multi stage attack cannot be tackle with the normal methods. Attack Oriented to Attack Resistance Test”, ICNSC, 2007.
So, An adaptive model can be made related to this type of [11] D. Fava, J. Holsopple, S. J. Yang, B. Argauer, “Terrain
attack which will generate the attack alerts based on the and Behavior Modeling for Projecting Multistage Cyber
previous data of the attacks. As In multistage attack attackers Attacks”
flush the victims with heavy DOS attacks, there will be [12] R. Katipally, W. Gasior, X. Cui, L. Yang, “Multi Stage
enormous amount of alerts that will get generate. So, An Attack Detection System for Network Administrators Using
attack correlation system should be there in the system that Data Mining”
will generate the alerts for those attack patterns only which [13] Z. Duan, X. Yuan, J. Chandrashekar, “Controlling IP
can really result in some attack and its consequence. Spoofing Through Inter-Domain Packet Filters” IEEE, 2006.
[14] Y. Chen, W. Trappe, R.P. Martin, “Detecting and
Localizing Wireless Spoofing Attacking”.
VI. FUTURE SCOPE
[15] Y.Chen, K. Hwang, W. S. Ku,”Collaborative Detection of
This methodology can further be refined with the help of more DDoS Attacks Over Multiple Network Domains”.
data base regarding the attack sequence possible in case of [16] “Lets Talk Security”, [Online]. Available:
multi stage attack. That data base will be use to train the http://letstalk.globalservices.bt.com/en/security/2013/08/multi-
system and this will further be useful in predicting the attacks stage-attack-modelling-your-new-weapon-against-
techniques, patterns and then at some point most of the sophisticated-cyber-attacks/ last accessed on 12-10-2014.
possibilities can be considered and most possible attacks can [17] “ACM Digital Library”, [Online]. Available:
be tackled. http://dl.acm.org/citation.cfm?id=1179578/ last accessed on
12-10-2014
[18] “Springer Link”, [Online]. Available:
References http://link.springer.com/chapter/10.1007%2F978-3-642-
[1] Clark D.D, Landau S. “The Problem is not the Attribution; 33469-6_37/ last accessed on 12-10-2014.
It’s Multi Stage Attack”, ACM, pp. 4503 , 2010. [19] “Incapsula”, [Online]. Available:
[2] S. Mathew, R. Giomundo, S. Upaadhyaya, M. Sudit, A. http://www.incapsula.com/ddos/ddos-attacks/ last accessed on
Stotz, “Understanding Multistage Attacks by Attack-Track 12-10-2014.
based Visualization of Heterogeneous Event Streams”, ACM, [20] “MIT Technology Review”, [Online]. Available:
pp. 549, 2006. http://www.technologyreview.com/view/528861/cyber-
[3] S. Mathew, R. Giomundo, S. Upaadhyaya, M. Sudit, A. attacks/ last accessed on 13-10-2014.
Stotz, “Real- Time Multistage Attack Awareness Through
Enhanced Intrusion Alert Clustering”, ACM, 2006.
[4] M. Alnas, A.M. Hanashi, E.M. Laias, “Detection of Botnet
Multi-Stage by Using Alert Correlation Model”, IJES, 2013.
[5] Symantec Report, “Protecting POS Environment Against
Multi-Stage Attacks”, Semantec Intelligence Report, 2013.
[6] S.J. Yang, J. Holsopple, M. Sudit, “Evaluating Threat
Assessment for Multi-Stage Cyber Attacks”.
[7] D. Shen, G. Chen, J. B. Cruz, L. Haynes, M. Kruger, E.
Blasch, “A Markov game Theoretic Data Fusion Approach for
Cyber Situational Awareness”, Office of Naval Research,
2007.