Fig 1 - uploaded by Rajesh Kumar
Content may be subject to copyright.
Cyber-kill chain model.

Cyber-kill chain model.

Source publication
Preprint
Full-text available
Advanced persistent threats (APTs) are different from other computer-based attacks in their target selection, attack technique, and malicious motive. In the past, there have been several APT attacks on industrial systems, bypassing the traditional security mechanisms, for example, the Stuxnet computer virus attack on nuclear facilities, attack on d...

Contexts in source publication

Context 1
... different from these papers, our model is customized to model and analyze APT attacks. Our paper leverages the industry-wide popular model of the cyber-kill chain (CKC, [15]), see Figure 1, to represent the APT attack stages. A CKC model, popular as a military kill chain in defense operations, is a sequence of well-defined stages, where the failure at a stage hinders the movement of the malicious actor to the next successive stage. ...
Context 2
... Figure 10(a), we plot the as-is scenarios. The probability of an APT attack within a mission time of 8800 hours is 0.175. ...
Context 3
... we modify the MTTA of all atomic steps one at a time by halving it. In Figure 11, we see that the attack step, find_zero_day_vulnerability and propagate_to_PCN are highly sensitive, i.e., a small change in their input values lead to large difference in probability of success. Hence, these steps from modelling point needs better attention and characterization. ...