publication . Part of book or chapter of book . Other literature type . Preprint . 2016

Technical Aspects of Cyber Kill Chain

Tarun Yadav; Arvind Mallari Rao;
Open Access
  • Published: 10 Jun 2016
  • Publisher: Springer International Publishing
Abstract
Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on rganizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder takes to penetrate information systems over time to execute an attack on the target. This paper broadly categories the methodologies, techniques and tools involved in cyber-attacks. This paper intends to help a cyber security researcher to realize the options available to ...
Persistent Identifiers
Subjects
ACM Computing Classification System: ComputingMilieux_MISCELLANEOUS
free text keywords: Computer Science - Networking and Internet Architecture, Computer Science - Cryptography and Security, Information system, Exploit, Computer science, Computer security, computer.software_genre, computer, Kill chain, Incident response, Command and control, Cyber-attack
53 references, page 1 of 4

[1] MALWARE RISKS AND MITIGATION REPORT. 1st ed. BITS - The Financial Services Roundtable; 2011. [Online]. Available at: http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf. [Accessed: 26- Mar- 2015].

[2] J. Ranum M. Breaking Cyber Kill Chains. Tenable Network Security. 2014. [Online].. Available at: http://www.tenable.com/blog/breaking-cyber-kill-chains. [Accessed: 26- Mar- 2015].

[3] Sager T. Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. Sansorg. 2014. [Online]. Available at: http://www.sans.org/reading-room/whitepapers/detection/killing-advanced-threats-trac [Accessed: 26- Mar- 2015].

[4] The Cyber Attack Cycle.[Online].. Available at: http://www.eur.army.mil/vigilance/Cyber Attack Cycle.pdf. [Accessed: 26- Mar- 2015].

[5] Hartley M. Strengthening Cyber Kill Chain with Cyber Threat Intelligence. iSIGHT Partners. 2014. [Online]. Available at: http://www.isightpartners.com/2014/09/strenghtening-cyber-kill-chain-cyber-threat-int [Accessed: 26- Mar- 2015].

[6] Hartley M. The Cyber Threat Kill Chain Part 2 of 2 - iSIGHT Partners. iSIGHT Partners. 2014. [Online]. Available at: http://www.isightpartners.com/2014/10/cyber-threat-kill-chain-part-2-2/. [Accessed: 26- Mar- 2015].

[7] Davis R. Exploit Kill Chain with Controls - Critical Start. Criticalstartcom. 2015. [Online]. Available at: http://www.criticalstart.com/2014/01/exploit-kill-chain-with-controls/. [Accessed: 26- Mar- 2015].

[8] Engel G. Deconstructing The Cyber Kill Chain. Dark Reading. 2014. [Online]. Available at: http://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d[Accessed: 26- Mar- 2015].

[9] IT Security Reconnaissance. [Online]. Available at: http://itsecurity.telelink.com/reconnaissance/ . [Accessed: 26- Mar2015].

[10] Pernet C. APT Kill chain - Part 3: Reconnaissance - Airbus D&S CyberSecurity blog. 2014. [Online]. Available at: http://blog.cassidiancybersecurity.com/post/2014/05/APT-Kill-chain-Part-3-%3AReconnaissance. [Accessed: 26- Mar- 2015].

[11] Bhamidipati S. The Art of Reconnaissance - Simple Techniques. sans.org. 2002. [Online]. Available at: http://www.sans.org/reading-room/whitepapers/auditing/art-reconnaissance-simple-tec [Accessed: 26- Mar- 2015].

[12] Security Threat Report 2013. 1st ed. SOPHOS; 2013.[Online]. Available at: http://www.sophos.com/en-us/medialibrary/pdfs/other/sophossecuritythreatreport2013 [Accessed: 26- Mar- 2015].

[13] Security Threat Report 2014. 1st ed. SOPHOS; 2014. [Online]. Available at: https://www.sophos.com/en-us/medialibrary/PDFs/other/sophossecurity-threat-report-2014.pdf. [Accessed: 26- Mar- 2015].

[14] Rodionov, Eugene, and Aleksandr Matrosov. ”Defeating Anti-Forensics in Contemporary Complex Threats.” Securelist.com,. 'The Ventir Trojan: Assemble Your Macos Spy - Securelist'. N.p., 2015.

Anley, Chris, et al. The shellcoder's handbook: discovering and exploiting security holes. John Wiley & Sons, 2011.

53 references, page 1 of 4
Abstract
Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on rganizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder takes to penetrate information systems over time to execute an attack on the target. This paper broadly categories the methodologies, techniques and tools involved in cyber-attacks. This paper intends to help a cyber security researcher to realize the options available to ...
Persistent Identifiers
Subjects
ACM Computing Classification System: ComputingMilieux_MISCELLANEOUS
free text keywords: Computer Science - Networking and Internet Architecture, Computer Science - Cryptography and Security, Information system, Exploit, Computer science, Computer security, computer.software_genre, computer, Kill chain, Incident response, Command and control, Cyber-attack
53 references, page 1 of 4

[1] MALWARE RISKS AND MITIGATION REPORT. 1st ed. BITS - The Financial Services Roundtable; 2011. [Online]. Available at: http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf. [Accessed: 26- Mar- 2015].

[2] J. Ranum M. Breaking Cyber Kill Chains. Tenable Network Security. 2014. [Online].. Available at: http://www.tenable.com/blog/breaking-cyber-kill-chains. [Accessed: 26- Mar- 2015].

[3] Sager T. Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. Sansorg. 2014. [Online]. Available at: http://www.sans.org/reading-room/whitepapers/detection/killing-advanced-threats-trac [Accessed: 26- Mar- 2015].

[4] The Cyber Attack Cycle.[Online].. Available at: http://www.eur.army.mil/vigilance/Cyber Attack Cycle.pdf. [Accessed: 26- Mar- 2015].

[5] Hartley M. Strengthening Cyber Kill Chain with Cyber Threat Intelligence. iSIGHT Partners. 2014. [Online]. Available at: http://www.isightpartners.com/2014/09/strenghtening-cyber-kill-chain-cyber-threat-int [Accessed: 26- Mar- 2015].

[6] Hartley M. The Cyber Threat Kill Chain Part 2 of 2 - iSIGHT Partners. iSIGHT Partners. 2014. [Online]. Available at: http://www.isightpartners.com/2014/10/cyber-threat-kill-chain-part-2-2/. [Accessed: 26- Mar- 2015].

[7] Davis R. Exploit Kill Chain with Controls - Critical Start. Criticalstartcom. 2015. [Online]. Available at: http://www.criticalstart.com/2014/01/exploit-kill-chain-with-controls/. [Accessed: 26- Mar- 2015].

[8] Engel G. Deconstructing The Cyber Kill Chain. Dark Reading. 2014. [Online]. Available at: http://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d[Accessed: 26- Mar- 2015].

[9] IT Security Reconnaissance. [Online]. Available at: http://itsecurity.telelink.com/reconnaissance/ . [Accessed: 26- Mar2015].

[10] Pernet C. APT Kill chain - Part 3: Reconnaissance - Airbus D&S CyberSecurity blog. 2014. [Online]. Available at: http://blog.cassidiancybersecurity.com/post/2014/05/APT-Kill-chain-Part-3-%3AReconnaissance. [Accessed: 26- Mar- 2015].

[11] Bhamidipati S. The Art of Reconnaissance - Simple Techniques. sans.org. 2002. [Online]. Available at: http://www.sans.org/reading-room/whitepapers/auditing/art-reconnaissance-simple-tec [Accessed: 26- Mar- 2015].

[12] Security Threat Report 2013. 1st ed. SOPHOS; 2013.[Online]. Available at: http://www.sophos.com/en-us/medialibrary/pdfs/other/sophossecuritythreatreport2013 [Accessed: 26- Mar- 2015].

[13] Security Threat Report 2014. 1st ed. SOPHOS; 2014. [Online]. Available at: https://www.sophos.com/en-us/medialibrary/PDFs/other/sophossecurity-threat-report-2014.pdf. [Accessed: 26- Mar- 2015].

[14] Rodionov, Eugene, and Aleksandr Matrosov. ”Defeating Anti-Forensics in Contemporary Complex Threats.” Securelist.com,. 'The Ventir Trojan: Assemble Your Macos Spy - Securelist'. N.p., 2015.

Anley, Chris, et al. The shellcoder's handbook: discovering and exploiting security holes. John Wiley & Sons, 2011.

53 references, page 1 of 4
Any information missing or wrong?Report an Issue