Inicio  /  Future Internet  /  Vol: 15 Par: 7 (2023)  /  Artículo
ARTÍCULO
TITULO

Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22

Sikha S. Bagui    
Dustin Mink    
Subhash C. Bagui    
Michael Plain    
Jadarius Hill and Marshall Elam    

Resumen

There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA0043) of the MITRE ATT&CK framework. Using the newly created dataset, UWF-Zeekdata22, based on the MITRE ATT&CK framework, patterns involving network connectivity, connection duration, and data volume were found and loaded into a graph environment. Patterns were also found in the graphed data that matched the Reconnaissance as well as other tactics captured by UWF-Zeekdata22. The star motif was particularly useful in mapping the Reconnaissance Tactic. The results of this paper show that graph databases/graph engines can be essential tools for understanding network traffic and trying to detect network intrusions before they happen. Finally, an analysis of the runtime performance of the reduced dataset used to create the graph databases showed that the reduced datasets performed better than the full dataset.

 Artículos similares

       
 
Xinya Lei, Yuewei Wang, Wei Han and Weijing Song    
Coastal cities are increasingly vulnerable to urban storm surge hazards and the secondary hazards they cause (e.g., coastal flooding). Accurate representation of the spatio-temporal process of hazard event development is essential for effective emergency... ver más

 
Guangsheng Dong, Rui Li, Fa Li, Zhaohui Liu, Huayi Wu, Longgang Xiang, Wensen Yu, Jie Jiang, Hongping Zhang and Fangning Li    
An imbalance in urban development in China has become a contradiction. Points of Interest (POIs) serve as representations of the spatial distribution of urban functions. Analyzing POI spatial co-occurrence patterns can reveal the agglomeration patterns o... ver más

 
Guy Austern, Tanya Bloch and Yael Abulafia    
The application of machine learning (ML) for the automatic classification of building elements is a powerful technique for ensuring information integrity in building information models (BIMs). Previous work has demonstrated the favorable performance of s... ver más
Revista: Buildings

 
Dennis Papenfuß, Bennet Gerlach, Stefan Fischer and Mohamed Ahmed Hail    
The IoT encompasses objects, sensors, and everyday items not typically considered computers. IoT devices are subject to severe energy, memory, and computation power constraints. Employing NDN for the IoT is a recent approach to accommodate these issues. ... ver más
Revista: Future Internet

 
Zhuangzhuang Yang, Chengxin Pang and Xinhua Zeng    
Predicting the future trajectories of multiple agents is essential for various applications in real life, such as surveillance systems, autonomous driving, and social robots. The trajectory prediction task is influenced by many factors, including individ... ver más