Mitre att&ck: State of the art and way forward

B Al-Sada, A Sadighian, G Oligeri - ACM Computing Surveys, 2024 - dl.acm.org
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques, and
procedures based on real-world observations. It has been used as a foundation for threat …

A survey of MulVAL extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Air‐Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

N Mohamed, SK Almazrouei, A Oubelaid… - Wireless …, 2022 - Wiley Online Library
Several security tools have been described in recent times to assist security teams; however,
the effectiveness and success remain limited to specific devices. Phishing is a type of …

Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets

S Choi, JH Yun, BG Min - Proceedings of the 14th Cyber Security …, 2021 - dl.acm.org
To practically leverage a dataset, various attack situations should be created according to
the user's objective and how realistic the generated attack sequence is should be …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners

A Happe, J Cito - Proceedings of the 31st ACM Joint European Software …, 2023 - dl.acm.org
Offensive security-tests are commonly employed to pro-actively discover potential
vulnerabilities. They are performed by specialists, also known as penetration-testers or white …

Know your enemy: Conversational agents for security, education, training, and awareness at scale

JS Giboney, RM Schuetzler, GM Grimes - Computers & Security, 2023 - Elsevier
Social engineering attacks are widespread, costly, and challenging to mitigate through
technical means. Companies allocate considerable resources toward security education …

Cyber attacker profiling for risk analysis based on machine learning

I Kotenko, E Fedorchenko, E Novikova, A Jha - Sensors, 2023 - mdpi.com
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack
forecasting, security incident investigations and security decision support. The attacker …

Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection

X Wang, X Yang, X Liang, X Zhang, W Zhang… - Computers & …, 2024 - Elsevier
Alert fatigue problems can have serious consequences for the enterprise security. When
analysts become overwhelmed by the sheer number of alerts, high-risk alerts may go …