Technical Aspects of Cyber Kill Chain

Preprint English OPEN
Yadav, Tarun; Mallari, Rao Arvind;
(2016)
  • Related identifiers: doi: 10.1007/978-3-319-22915-7_40
  • Subject: Computer Science - Networking and Internet Architecture | Computer Science - Cryptography and Security
    acm: ComputingMilieux_MISCELLANEOUS

Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on rganizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to devel... View more
  • References (53)
    53 references, page 1 of 6

    [1] MALWARE RISKS AND MITIGATION REPORT. 1st ed. BITS - The Financial Services Roundtable; 2011. [Online]. Available at: http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf. [Accessed: 26- Mar- 2015].

    [2] J. Ranum M. Breaking Cyber Kill Chains. Tenable Network Security. 2014. [Online].. Available at: http://www.tenable.com/blog/breaking-cyber-kill-chains. [Accessed: 26- Mar- 2015].

    [3] Sager T. Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. Sansorg. 2014. [Online]. Available at: http://www.sans.org/reading-room/whitepapers/detection/killing-advanced-threats-trac [Accessed: 26- Mar- 2015].

    [4] The Cyber Attack Cycle.[Online].. Available at: http://www.eur.army.mil/vigilance/Cyber Attack Cycle.pdf. [Accessed: 26- Mar- 2015].

    [5] Hartley M. Strengthening Cyber Kill Chain with Cyber Threat Intelligence. iSIGHT Partners. 2014. [Online]. Available at: http://www.isightpartners.com/2014/09/strenghtening-cyber-kill-chain-cyber-threat-int [Accessed: 26- Mar- 2015].

    [6] Hartley M. The Cyber Threat Kill Chain Part 2 of 2 - iSIGHT Partners. iSIGHT Partners. 2014. [Online]. Available at: http://www.isightpartners.com/2014/10/cyber-threat-kill-chain-part-2-2/. [Accessed: 26- Mar- 2015].

    [7] Davis R. Exploit Kill Chain with Controls - Critical Start. Criticalstartcom. 2015. [Online]. Available at: http://www.criticalstart.com/2014/01/exploit-kill-chain-with-controls/. [Accessed: 26- Mar- 2015].

    [8] Engel G. Deconstructing The Cyber Kill Chain. Dark Reading. 2014. [Online]. Available at: http://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d[Accessed: 26- Mar- 2015].

    [9] IT Security Reconnaissance. [Online]. Available at: http://itsecurity.telelink.com/reconnaissance/ . [Accessed: 26- Mar2015].

    [10] Pernet C. APT Kill chain - Part 3: Reconnaissance - Airbus D&S CyberSecurity blog. 2014. [Online]. Available at: http://blog.cassidiancybersecurity.com/post/2014/05/APT-Kill-chain-Part-3-%3AReconnaissance. [Accessed: 26- Mar- 2015].

  • Related Research Results (1)
  • Metrics
Share - Bookmark