Cyber kill chain based threat taxonomy and its application on cyber common operational picture

S Cho, I Han, H Jeong, J Kim, S Koo… - … Conference On Cyber …, 2018 - ieeexplore.ieee.org
Over a decade, intelligent and persistent forms of cyber threats have been damaging to the
organizations' cyber assets and missions. In this paper, we analyze current cyber kill chain …

Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning

S Wen, N He, H Yan - Proceedings of the 2017 VI International …, 2017 - dl.acm.org
It has been discovered that quite a few organizations have become the victims of APT, which
is a deliberate and malicious espionage threat to military, political, infrastructure targets for …

[PDF][PDF] Proposed framework for effective detection and prediction of advanced persistent threats based on the cyber kill chain

FA Garba, SB Junaidu, I Ahmad… - Scientific and Practical …, 2018 - journal.scsa.ge
The cost of data breach resulting from cyber attacks is estimated to be $3.62 million dollars
worldwide according to a report. Advanced Persistent Threat (APT) is a targeted cyber attack …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures

PN Bahrami, A Dehghantanha, T Dargahi… - Journal of information …, 2019 - koreascience.kr
The need for cyber resilience is increasingly important in our technology-dependent society
where computing devices and data have been, and will continue to be, the target of cyber …

MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network

A Ju, Y Guo, T Li - Multimedia Tools and Applications, 2020 - Springer
The emerging cyber security threats pose many challenges to security analysts of enterprise
multimedia environments when analysts attempting to analyze and reconstruct advanced …

A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies

A Rege, Z Obradovic, N Asadi, B Singer… - … Conference on Cyber …, 2017 - ieeexplore.ieee.org
Current approaches to cybersecurity are response-driven and ineffective as they do not
account for adaptive adversarial behavior and dynamic decision-making. Using empirical …

Towards a definition of cyberspace tactics, techniques and procedures

F Maymí, R Bixler, R Jones… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Cybersecurity professionals often speak of tactics, techniques and procedures (TTPs) when
describing the activities of threat actors, yet these terms are not as well defined in …

Modeling attack, defense and threat trees and the cyber kill chain, att&ck and stride frameworks as blackboard architecture networks

J Straub - 2020 IEEE International conference on smart cloud …, 2020 - ieeexplore.ieee.org
Multiple techniques for modeling cybersecurity attacks and defense have been developed.
The use of tree-structures as well as techniques proposed by several firms (such as …

A cognitive and concurrent cyber kill chain model

MS Khan, S Siddiqui, K Ferens - Computer and Network Security …, 2018 - Springer
A cyber kill chain is a traditional model to analyze cyber security threats, whether there is a
malware inside a computer system, covert and illegitimate channels found on a network, or …