Multimodal graph analysis of cyber attacks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

The limited information on the cyberattacks available in the unclassified regime, hardens standardizing the analysis. We address the problem of modeling and analyzing cyberattacks using a multimodal graph approach. We formulate the stages, actors, and outcomes of cyberattacks as a multimodal graph. Multimodal graph nodes include cyberattack victims, adversaries, autonomous systems, and the observed cyber events. In multimodal graphs, single-modality graphs are interconnected according to their interaction. We apply community and centrality analysis on the graph to obtain in-depth insights into the attack. In community analysis, we cluster those nodes that exhibit “strong” inter-modal ties. We further use centrality to rank the nodes according to their importance. Classifying nodes according to centrality provides the progression of the attack from the attacker to the targeted nodes. We apply our methods to two popular case studies, namely GhostNet and Putter Panda and demonstrate a clear distinction in the attack stages.

Original languageEnglish (US)
Title of host publicationSimulation Series
PublisherThe Society for Modeling and Simulation International
Edition1
ISBN (Electronic)9781510892521, 9781510892538, 9781510892545, 9781510892552, 9781510892569
DOIs
StatePublished - 2019
Event2019 Annual Simulation Symposium, ANSS 2019, Part of the 2019 Spring Simulation Multi-Conference, SpringSim 2019 - Tucson, United States
Duration: Apr 29 2019May 2 2019

Publication series

NameSimulation Series
Number1
Volume51
ISSN (Print)0735-9276

Conference

Conference2019 Annual Simulation Symposium, ANSS 2019, Part of the 2019 Spring Simulation Multi-Conference, SpringSim 2019
Country/TerritoryUnited States
CityTucson
Period4/29/195/2/19

Keywords

  • Centrality analysis
  • Community analysis
  • Cyber-attacks
  • Multimodal graph

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Multimodal graph analysis of cyber attacks'. Together they form a unique fingerprint.

Cite this