0% found this document useful (0 votes)
53 views

Review of Multistage Cyber Attack: International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8

This document discusses multistage cyber attacks and approaches to tackle them. It describes how multistage attacks work through sequential sub-attacks, with each step having a specific task. Common types of multistage attacks are discussed, along with approaches that have been proposed to better detect them, including correlating intrusion alerts, visualizing event traffic, and classifying alerts based on their role in multi-stage attacks. Improving detection of these long-term, sophisticated attacks remains an important area of research.

Uploaded by

vanpoint
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Review of Multistage Cyber Attack: International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8

This document discusses multistage cyber attacks and approaches to tackle them. It describes how multistage attacks work through sequential sub-attacks, with each step having a specific task. Common types of multistage attacks are discussed, along with approaches that have been proposed to better detect them, including correlating intrusion alerts, visualizing event traffic, and classifying alerts based on their role in multi-stage attacks. Improving detection of these long-term, sophisticated attacks remains an important area of research.

Uploaded by

vanpoint
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8

Published Online June – July 2015 in IJEAST (http://www.ijeast.org/)

Review of Multistage Cyber Attack

Kuldeep Singh Priyanka Singh Pradeep Kumar Singh


Dept. of CS & E Dept. of CS & E Assistant Professor
Amity University Amity University Dept. of CS & E
Noida, U.P, INDIA Noida, U.P, INDIA Amity University
[email protected] [email protected] [email protected]

Abstract— with the increasing use of internet and penetration followed by the removal of it’s traces, then
networking devices, threat of the cyber attacks is also searching of the victim’s data to be manipulated or attack.
increasing. Group of specialist hackers are been higher by These long Term Attacks with heavy damage are called as
states and criminal organizations to spoil and steel the data Advanced Persistent Attacks(ATP). Big Organizations like
of organizations. With the increase in the security systems, “Google” which have huge data bases are investing a lot in
attackers have also come up with the new techniques and their security system but still many of them suffer from these
methods. Most affective and long term attack methodology attacks. Even if any single step gets failed then the whole
at present is Multi Stage attacks which comprises of many attack may fail. But the attackers use these attacks quite
sequential sub attacks at different levels. Each sub Attack proficiently. Hence has caused huge monitory and data loss to
has a specific task to perform. Multi Stage attack includes industry, people and nation.
penetration followed by the removal of its traces, then
searching of the victim’s data to be manipulated or attack II. MULTI STAGE ATTACK PATTERN
and then performing main task. These long Term Attacks Today cyber attackers are incorporating different and
are also termed as Advanced Persistent Attack (ATP). advanced methodology in their attacks. Therefore,
Organizations are investing a lot in their security system professional cyber analysts are being higher for monitoring the
but still 95 % of them are the victims of these attacks. attack. Analysts see the attack according to its affect on the
To tackle this type of attacks a simulation system network. But, more information is there in its sub attacks. So,
can be implemented in which these attacks can be To tackle multi stage attacks analysts are working on the
implemented and then studied. With that study, data can attack patterns of multi stage attack, patterns of sub attacks.
be generated which can be used for mapping of different With these attack patterns real big picture of attack can be
types of Multi Stage attacks. This mapping is done by predicted.
analyzing the network abnormal behavior if there is any.
Few Attacks that are the part of multi stage attack are:-
Keywords— Multi Stage Attack, Advanced Persistent Attack,
 Call of Action
Penetration, Clustering and Cyber Attacks.
 Recruitment

 Intelligence Gathering
I. INTRODUCTION
Increasing use of internet and network devices, threat of  Vulnerability Scanning
the cyber attacks is increasing. As the most of the devices are  Defacement
open into the network with not much of security, there is
always the chance of security Breach. Crackers and Hackers  Steal Information
(Black Hats) are been higher by criminal organizations to spoil  Mass DOS Attack
the data of legitimate organizations. Most effective attack
technique now a days are DDoS and multi stage attacks which
III. APPROACHES TO TACKLE
itself comprises of many sub attacks. Each sub Attack has a
specific and fixed task to perform. First step of Multi Stage is a. In [1], Clark D.D et al discusses the reason for network
level personal attribution is of very limited forensic
International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Published Online June – July 2015 in IJEAST (http://www.ijeast.org/)

importance. He analyzes and focuses on the different better detection of Multistage Attacks and this way
types of attacks based on internet, and observes the role system can be made more robust.
and performance of currently available alternatives to
attribution plays in preclusion and prosecution. We can’t
design the Network system again because it will cost very
a lot. So, instead of alternating the network system focus
should be on other approaches, like as making multi stage
cyber attacks more difficult, resource consuming and
costly. And, instead of issuing the calls for better
attribution on the network, such applications should be
designed that can do better job of integrating identity.

b. In [2], S. Mathew et al presented a method of handling


the visualization of heterogeneous event traffic that is
created by intrusion detection sensors, log files and other
event sources on a computer network from the point of
view of detecting Multi Stage Attack paths that are of
importance. Aggregation and correlation of these events
based on their Semantic content to generate Attack Tracks
that are displayed to analyst in the real time. The tool used
here is Event correlation for cyber attack Recognition
System. Testing of this system indicates the correlation
and visualization of heterogeneous network events in the
context of multistage attacks adds significant value to the
practice of cyber attack detection. Fig: 1 Effective Attack Awareness indicating attack
stage progression [3].
Precision = Number of True Positives
Number of True Positives + Number of False Positives
d. In [4], M. Alnas et al discusses the Network Intrusion
Recall = Number of True Positives Detection Systems (NIDS) are considered as one of the
Number of True Positives + Number of False Negatives
essential mechanisms to ensure reliable security.
Detection of novel and multi-stage attacks are not
c. In [3], S. Mathew et al discusses the Correlation and
efficiently achieved by the signature-based systems.
fusion of intrusion alerts to provide effective situation
Hence, the systematic analysis of attack initiation has
awareness of the cyber attacks and it is very much
become a stressing demand in current research.
accepted by research teams in this field. Snort is the most
Correlation of Alerts techniques have been widely used to
widely used Intrusion Detection sensor. For security,
provide intelligent and stateful detection methodologies.
admin snort is the primary indicator of the network
In his paper the limitations of the present techniques and
misuse. He discusses an Attack stage oriented
model for correlation for the alerts have been identified
classification of alerts using snort in his paper.
that overcomes the weaknesses. An improved
Classification of intrusion detection sensor alerts is done
“require/provide” model is presented which established
based on their role as the part of goal oriented multi stage
cooperation between statistical and knowledge-based
attacks. This approach improves the real-time awareness
model, to achieve higher detection rate with the minimal
for the multistage attack.
false positives. This methodology is been implemented in
an isolated environment to tackle the most dangerous
In his paper he presented a scheme of classification of
problems that is bot-nets.
intrusion detection alerts based on their roles. Further IDS
sensors alerts can be incorporated into the scheme for
International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Published Online June – July 2015 in IJEAST (http://www.ijeast.org/)

Algorithm:

Input: elementary alerts generated by the IDS


Output: Correlated Attack Graph CAG (N,G)
Methods:
1- Let CAG (N,G) = null
2- Map elementary alerts to M-Alerts instances (m0,m1,……, m
i)

3- Let m 0 an instance of isolated M


4- For k=1 to i

If a. at least one R(m i+1) i)

b. V(m i+1), V(m), EX(m), and D(m) are satisfied.


c. P(mi).End_time >= R (m i+1).Start_time
.End_time >= R (m i+1).Start_time
Then
Add CAG (nm , nm )
i i+1

Fig 2: An Example of Decision Support Based on static


5- Return CAG (N,G)
matrix game model [7].
IV. In [6], S.J Yang et al say that Current methodologies to
e. In [8], F.A Bahareth et al say that with the increase in
fight against cyber attacks are typically reactive yet non
attacks the alerts generated against the attack is also
resistive. Recent research work has come up with techniques
iincreasing.
which can predict hacker’s target machines in the early stage
of the attack. Though predictions can be made regarding the
attack but still false prediction can happen. Very little had
been researched about how to evaluate an algorithm for threat
assessment. With the increasing attacks, a threat assessment
algorithm will be more susceptible. But still the lack of
database is perhaps the part of very reason why little can be
found about assessment of cyber attack. So, it is suggested that
different mixtures of methodologies has to be selected or taken
to tackle normal and abnormal cyber-attacks.In [7], D. Shen et
al proposed level based methodology in which alerts
generated by Intrusion Detection Sensors (IDSs) or Intrusion
Prevention Sensors (IPSs) are put into the data refinement
which is at level 0 and object assessment which is at level 1.
Markov game model is used for High-level situation/threat
assessment (L2/L3). To refine the primitive prediction
generated by adaptive feature/pattern recognition, Hierarchical
Entity Aggregation is proposed and further captures new
unknown features. To estimate the belief of each possible
cyber attack pattern a markov game method is used. Game Fig 3: Proposed Solution Framework [8].
theory can capture the nature of cyber conflicts: determination
of the attacking-force strategies is tightly hold together. The number of alerts generated has started to become the
Also, Markov game theory deals with uncertainty and problem. To tackle these attacks plus the alerts generated
incompleteness of available Information. with the attacks, attack correlation methodology is been
International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Published Online June – July 2015 in IJEAST (http://www.ijeast.org/)

accepted which will set up the alert correlation which can from some legitimate user or from some attacker. In the
result in attack. This way the number of alerts can be beginning the system will be in the learning stage to know
decreased. Sequential mining algorithm is used to find out the resources accessed by the users and then later creating
the attack pattern. To improve the efficiency of this the graph of Ip addresses against the Hop Count. Based
methodology, the candidate verification that calculates on this chart system can differentiate valid user and
alert correlativity while generating candidate attack attacker.
sequence should is done .

Hop count = TTL(Initial) – TTL(final)


f. In [9], H. Wang et al discusses that IP Spoofing has
mostly exploited by Distributed Denial of service.
Attacker uses different slave machines to attack the victim
for their malicious activities. They can manipulate many
attributes in the network to deceive the admin and
network security but they can’t alter one thing that is Hop
Count traveled to reach the target machine.

Fig 5: Hop Count Distribution of IP addresses with a


single source, randomized TTL [9].

g. In [10], S. Xin et al discusses that Distributed Denial of


service attack is very effective and important part of the
Fig 4: Hop count distribution of IP addresses with a
multistage attack. Many servers efficiency get reduced
single flood source [9].
from its normal efficiency to low because of this type of
attack. But, all the multistage attacks can be subdivided
Hop count is the number of intermediate machines a data
into sub attacks. When these attacks complete their task
packet has traveled to reach its destination machine.
for which they are designed then only whole attack will
Maximum number of Hop Count a data packet can have is
get successful. So, A learning engine can be designed
16. Hop count can be calculated by deducting 1 from TTL
which will be having the knowledge of different types of
value each time data packet traveled to intermediate
combination possible of the atomic attack with high
machines before reaching the final machine. In this paper
proximity for the cyber attack. And, Base upon those
Hop count is used to detect whether the request is coming
International Journal of Engineering Applied Sciences and Technology, 2015, 1, 1-8
Published Online June – July 2015 in IJEAST (http://www.ijeast.org/)

combinations the attacks can be identified and then [8] F. A Bahareth, O. O. Bamasak, “Constructing Attack
tackled within the time with least possible loss. Scenario Using Sequential Pattern Mining with Correlated
Candidate Sequences”, ACM, 2013.
[9] H. Wang, C. Jin, K. G. Shin, “Defense Against Spoofed IP
V. CONCLUSION
Traffic Using Hop-Count Filtering”, IEEE/ACM, 2007.
On the basis of above discussion conclusion can be made that [10] S. Xin, X. Chen, H. Tang, N. Zhu, “Research on DoS
multi stage attack cannot be tackle with the normal methods. Attack Oriented to Attack Resistance Test”, ICNSC, 2007.
So, An adaptive model can be made related to this type of [11] D. Fava, J. Holsopple, S. J. Yang, B. Argauer, “Terrain
attack which will generate the attack alerts based on the and Behavior Modeling for Projecting Multistage Cyber
previous data of the attacks. As In multistage attack attackers Attacks”
flush the victims with heavy DOS attacks, there will be [12] R. Katipally, W. Gasior, X. Cui, L. Yang, “Multi Stage
enormous amount of alerts that will get generate. So, An Attack Detection System for Network Administrators Using
attack correlation system should be there in the system that Data Mining”
will generate the alerts for those attack patterns only which [13] Z. Duan, X. Yuan, J. Chandrashekar, “Controlling IP
can really result in some attack and its consequence. Spoofing Through Inter-Domain Packet Filters” IEEE, 2006.
[14] Y. Chen, W. Trappe, R.P. Martin, “Detecting and
Localizing Wireless Spoofing Attacking”.
VI. FUTURE SCOPE
[15] Y.Chen, K. Hwang, W. S. Ku,”Collaborative Detection of
This methodology can further be refined with the help of more DDoS Attacks Over Multiple Network Domains”.
data base regarding the attack sequence possible in case of [16] “Lets Talk Security”, [Online]. Available:
multi stage attack. That data base will be use to train the http://letstalk.globalservices.bt.com/en/security/2013/08/multi-
system and this will further be useful in predicting the attacks stage-attack-modelling-your-new-weapon-against-
techniques, patterns and then at some point most of the sophisticated-cyber-attacks/ last accessed on 12-10-2014.
possibilities can be considered and most possible attacks can [17] “ACM Digital Library”, [Online]. Available:
be tackled. http://dl.acm.org/citation.cfm?id=1179578/ last accessed on
12-10-2014
[18] “Springer Link”, [Online]. Available:
References http://link.springer.com/chapter/10.1007%2F978-3-642-
[1] Clark D.D, Landau S. “The Problem is not the Attribution; 33469-6_37/ last accessed on 12-10-2014.
It’s Multi Stage Attack”, ACM, pp. 4503 , 2010. [19] “Incapsula”, [Online]. Available:
[2] S. Mathew, R. Giomundo, S. Upaadhyaya, M. Sudit, A. http://www.incapsula.com/ddos/ddos-attacks/ last accessed on
Stotz, “Understanding Multistage Attacks by Attack-Track 12-10-2014.
based Visualization of Heterogeneous Event Streams”, ACM, [20] “MIT Technology Review”, [Online]. Available:
pp. 549, 2006. http://www.technologyreview.com/view/528861/cyber-
[3] S. Mathew, R. Giomundo, S. Upaadhyaya, M. Sudit, A. attacks/ last accessed on 13-10-2014.
Stotz, “Real- Time Multistage Attack Awareness Through
Enhanced Intrusion Alert Clustering”, ACM, 2006.
[4] M. Alnas, A.M. Hanashi, E.M. Laias, “Detection of Botnet
Multi-Stage by Using Alert Correlation Model”, IJES, 2013.
[5] Symantec Report, “Protecting POS Environment Against
Multi-Stage Attacks”, Semantec Intelligence Report, 2013.
[6] S.J. Yang, J. Holsopple, M. Sudit, “Evaluating Threat
Assessment for Multi-Stage Cyber Attacks”.
[7] D. Shen, G. Chen, J. B. Cruz, L. Haynes, M. Kruger, E.
Blasch, “A Markov game Theoretic Data Fusion Approach for
Cyber Situational Awareness”, Office of Naval Research,
2007.

You might also like