A cognitive and concurrent cyber kill chain model

MS Khan, S Siddiqui, K Ferens - Computer and Network Security …, 2018 - Springer
A cyber kill chain is a traditional model to analyze cyber security threats, whether there is a
malware inside a computer system, covert and illegitimate channels found on a network, or …

MCKC: a modified cyber kill chain model for cognitive APTs analysis within Enterprise multimedia network

A Ju, Y Guo, T Li - Multimedia Tools and Applications, 2020 - Springer
The emerging cyber security threats pose many challenges to security analysts of enterprise
multimedia environments when analysts attempting to analyze and reconstruct advanced …

Cyber kill chain based threat taxonomy and its application on cyber common operational picture

S Cho, I Han, H Jeong, J Kim, S Koo… - … Conference On Cyber …, 2018 - ieeexplore.ieee.org
Over a decade, intelligent and persistent forms of cyber threats have been damaging to the
organizations' cyber assets and missions. In this paper, we analyze current cyber kill chain …

[PDF][PDF] Modelling Hybrid Cyber Kill Chain.

W Zeng, V Germanos - PNSE@ Petri Nets/ACSD, 2019 - researchgate.net
The Cyber Kill Chain (CKC) model is an industry-accepted methodology for understanding
how an attacker will conduct the activities necessary to cause harm to the organizations …

SOC critical path: A defensive kill chain model

A Villalón-Huerta, HM Gisbert, I Ripoll-Ripoll - Ieee Access, 2022 - ieeexplore.ieee.org
Different kill chain models have been defined and analyzed to provide a common sequence
of actions followed in offensive cyber operations. These models allow analysts to identify …

Technical aspects of cyber kill chain

T Yadav, AM Rao - Security in Computing and Communications: Third …, 2015 - Springer
Recent trends in targeted cyber-attacks has increased the interest of research in the field of
cyber security. Such attacks have massive disruptive effects on organizations, enterprises …

Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains

EM Hutchins, MJ Cloppert, RM Amin - Leading Issues in …, 2011 - books.google.com
Conventional network defense tools such as intrusion detection systems and anti-virus focus
on the vulnerability component of risk, and traditional incident response methodology …

[PDF][PDF] Thinking about intrusion kill chains as mechanisms

JM Spring, E Hatleback - Journal of Cybersecurity, 2017 - academic.oup.com
We integrate two established modeling methods from disparate fields: mechanisms from the
philosophy of science literature and intrusion kill chain modeling from the computer security …

Artificial intelligence in cybersecurity: the use of AI along the cyber kill chain

I Chomiak-Orsa, A Rot, B Blaicke - International Conference on …, 2019 - Springer
The current challenge with defense against cyberattacks is that the speed and quantity of
threats often outpace human-centered cyber defense capabilities. That is why a new …

[图书][B] A conceptual interdisciplinary plug-and-play cyber security framework

KKR Choo - 2014 - Springer
Malicious cyber activities are no longer a matter of if but of when, and in our increasingly
interconnected world, threats to our national sovereignty can come from unexpected sources …