Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework

被引:1
|
作者
Mundt, Michael [1 ,2 ]
Baier, Harald [2 ]
机构
[1] Esri Deutschland GmbH, Bonn, Germany
[2] Univ Bundeswehr Munchen, Res Inst CODE, Neubiberg, Germany
关键词
Cyber Threat Intelligence; Data exfiltration; Information Security Management System;
D O I
10.1007/978-3-031-06365-7_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based attacks and their mitigation are of increasing importance in our ever-connected world. Besides denial of service a major goal of today's attackers is to gain access to the victim's data (e.g. for espionage or blackmailing purposes). Hence the detection and prevention of data exfiltration is one of the major challenges of institutions connected to the Internet. The cyber security community provides different standards and best-practices on both high and fine-granular level to handle this problem. In this paper we propose a conclusive process, which links Cyber Threat Intelligence (CTI) and Information Security Management Systems (ISMS) in a dynamic manner to reduce the risk of unwanted data loss through data exfiltration. While both CTI and ISMS are widespread in modern cyber security strategies, most often they are implemented concurrently. Our process, however, is based on the hypothesis that the mitigation of data loss is improved if both CTI and ISMS interact with one another and complement each other conclusively. Our concept makes use of the MITRE ATT&CK framework in order to enable (partial) automatic execution of our process chain and to execute proactive simulations to measure the effectiveness of the implemented countermeasures and to identify any security gaps that may exist.
引用
收藏
页码:139 / 158
页数:20
相关论文
共 50 条
  • [1] Towards a Security Analysis of Radiological Medical Devices using the MITRE ATT&CK Framework
    Zisad, Sharif Noor
    Hasan, Ragib
    SOUTHEASTCON 2024, 2024, : 1577 - 1582
  • [2] Linking CVE's to MITRE ATT&CK Techniques
    Kuppa, Aditya
    Aouad, Lamine
    Nhien-An Le-Khac
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [3] Labeling NIDS Rules with MITRE ATT&CK Techniques Using ChatGPT
    Daniel, Nir
    Kaiser, Florian Klaus
    Dzega, Anton
    Elyashar, Aviad
    Puzis, Rami
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 76 - 91
  • [4] Learning the Associations of MITRE ATT&CK Adversarial Techniques
    Al-Shaer, Rawan
    Spring, Jonathan M.
    Christou, Eliana
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [5] Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework
    Oruc, Aybars
    Amro, Ahmed
    Gkioulos, Vasileios
    SENSORS, 2022, 22 (22)
  • [6] How does Endpoint Detection use the MITRE ATT&CK Framework?
    Virkud, Apurva
    Inam, Muhammad Adil
    Riddle, Andy
    Liu, Jason
    Wang, Gang
    Bates, Adam
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3891 - 3908
  • [7] Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework
    Jo, Yonghyun
    Choi, Oongjae
    You, Jiwoon
    Cha, Youngkyun
    Lee, Dong Hoon
    SENSORS, 2022, 22 (05)
  • [8] Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework
    Georgiadou, Anna
    Mouzakitis, Spiros
    Askounis, Dimitris
    SENSORS, 2021, 21 (09)
  • [9] CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques
    Grigorescu, Octavian
    Nica, Andreea
    Dascalu, Mihai
    Rughinis, Razvan
    ALGORITHMS, 2022, 15 (09)
  • [10] Introduction to MITRE ATT&CK: Concepts and Use Cases
    Son, Seok Bin
    Park, Soohyun
    Lee, Haemin
    Kim, Youngkee
    Kim, Dongwan
    Kim, Joongheon
    2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 158 - 161