Zobrazeno 1 - 10
of 262
pro vyhledávání: '"mitre att&ck"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 3, Pp 410-448 (2024)
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by practitioners within the industry or underground communities. Similarly, academic researchers have also contributed to developing security tools. However, the
Externí odkaz:
https://doaj.org/article/f85a105f61314b72b081b1a9ece2f3d3
Publikováno v:
Российский технологический журнал, Vol 12, Iss 3, Pp 25-36 (2024)
Objectives. The currently increasing number of targeted cyberattacks raises the importance of investigating information security incidents. Depending on the available means of protection, computer forensic experts use software and hardware tools for
Externí odkaz:
https://doaj.org/article/72d335766bb045e3a8f3f5cce076b2b6
Autor:
Danil Smirnov, Oleg Evsutin
Publikováno v:
Информатика и автоматизация, Vol 23, Iss 3, Pp 642-683 (2024)
Цифровизация современной экономики привела к масштабному проникновению информационных технологий в различные сферы человеческой дея
Externí odkaz:
https://doaj.org/article/26ebac74765841f08a3807c0f0a63ed1
Publikováno v:
IEEE Access, Vol 12, Pp 166742-166760 (2024)
In recent years, vulnerabilities in industrial control systems have increased substantially. The operational environment’s availability constraints hinder penetration testing from the attacker’s perspective as a viable vulnerability management me
Externí odkaz:
https://doaj.org/article/81689ef5376e4f139c457a3b5a2fecdf
Publikováno v:
IEEE Access, Vol 12, Pp 153550-153563 (2024)
Industrial control systems (ICS) are vital for ensuring the reliability and operational efficiency of critical infrastructure across various industries. However, due to their integration into modernized network environments, they are inadvertently ex
Externí odkaz:
https://doaj.org/article/b6da3b549dd04184ab6e6966957025e5
Publikováno v:
IEEE Access, Vol 12, Pp 89291-89309 (2024)
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK matr
Externí odkaz:
https://doaj.org/article/97f56a2c6c57405fbdb4af3281ee966d
Publikováno v:
IEEE Access, Vol 12, Pp 68624-68636 (2024)
In cybersecurity, adversaries employ a myriad of tactics to evade detection and breach defenses. Malware remains a formidable weapon in their arsenal. To counter this threat, researchers unceasingly pursue dynamic analysis, which aims to comprehend a
Externí odkaz:
https://doaj.org/article/a4db618c9e484201b6ced964884ea098
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Data in Brief, Vol 54, Iss , Pp 110290- (2024)
The novel dataset called Linux-APT Dataset 2024 captures Advanced Persistent Threat (APT) attacks along with other latest and sophisticated payloads. Existing datasets lacks latest attacker's techniques and procedures, APTs tactics and configuration
Externí odkaz:
https://doaj.org/article/7ebbe35a04d24bbb9a2e8de3d1735abe
Autor:
Insup Lee, Changhee Choi
Publikováno v:
ICT Express, Vol 9, Iss 6, Pp 1065-1070 (2023)
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as
Externí odkaz:
https://doaj.org/article/7c0217f12dcc4dd1a8a0680d1370ac72