Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = technical cyberattack attribution

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 1742 KB  
Technical Note
Instrumenting OpenCTI with a Capability for Attack Attribution Support
by Sami Ruohonen, Alexey Kirichenko, Dmitriy Komashinskiy and Mariam Pogosova
Forensic Sci. 2024, 4(1), 12-23; https://doi.org/10.3390/forensicsci4010002 - 23 Jan 2024
Cited by 3 | Viewed by 7442
Abstract
In addition to identifying and prosecuting cyber attackers, attack attribution activities can provide valuable information for guiding defenders’ security procedures and supporting incident response and remediation. However, the technical analysis involved in cyberattack attribution requires skills, experience, access to up-to-date Cyber Threat Intelligence, [...] Read more.
In addition to identifying and prosecuting cyber attackers, attack attribution activities can provide valuable information for guiding defenders’ security procedures and supporting incident response and remediation. However, the technical analysis involved in cyberattack attribution requires skills, experience, access to up-to-date Cyber Threat Intelligence, and significant investigator effort. Attribution results are not always reliable, and skillful attackers often work hard to hide or remove the traces of their operations and to mislead or confuse investigators. In this article, we translate the technical attack attribution problem to the supervised machine learning domain and present a tool designed to support technical attack attribution, implemented as a machine learning model extending the OpenCTI platform. We also discuss the tool’s performance in the investigation of recent cyberattacks, which shows its potential in increasing the effectiveness and efficiency of attribution operations. Full article
(This article belongs to the Special Issue Human and Technical Drivers of Cybercrime)
Show Figures

Figure 1

19 pages, 7749 KB  
Review
A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures
by Murtaza Ahmed Siddiqi, Wooguil Pak and Moquddam A. Siddiqi
Appl. Sci. 2022, 12(12), 6042; https://doi.org/10.3390/app12126042 - 14 Jun 2022
Cited by 78 | Viewed by 43606
Abstract
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s security architecture. Social engineering attacks exploit specific human [...] Read more.
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s security architecture. Social engineering attacks exploit specific human attributes and psychology to bypass technical security measures for malicious acts. Social engineering is becoming a pervasive approach used for compromising individuals and organizations (is relatively more convenient to compromise a human compared to discovering a vulnerability in the security system). Social engineering-based cyberattacks are extremely difficult to counter as they do not follow specific patterns or approaches for conducting an attack, making them highly effective, efficient, easy, and obscure approaches for compromising any organization. To counter such attacks, a better understanding of the attack tactics is highly essential. Hence, this paper provides an in-depth analysis of the approaches used to conduct social engineering-based cyberattacks. This study discusses human vulnerabilities employed by criminals in recent security breaches. Further, the paper highlights the existing approaches, including machine learning-based methods, to counter social engineering-based cyberattacks. Full article
(This article belongs to the Special Issue Recent Advances in Cybersecurity and Computer Networks)
Show Figures

Figure 1

Back to TopTop