Näytä suppeat kuvailutiedot

dc.contributor.authorMyllyla, Juuso
dc.contributor.authorCostin, Andrei
dc.contributor.editorBalandin, Sergey
dc.contributor.editorKoucheryavy, Yevgeni
dc.contributor.editorTyutina, Tatiana
dc.date.accessioned2021-07-27T10:42:49Z
dc.date.available2021-07-27T10:42:49Z
dc.date.issued2021
dc.identifier.citationMyllyla, J., & Costin, A. (2021). Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic. In S. Balandin, Y. Koucheryavy, & T. Tyutina (Eds.), <i>FRUCT '29 : Proceedings of the 29th Conference of Open Innovations Association FRUCT</i> (pp. 465-474). FRUCT Oy. Proceedings of Conference of Open Innovations Association FRUCT. <a href="https://fruct.org/publications/acm29/files/Myl.pdf" target="_blank">https://fruct.org/publications/acm29/files/Myl.pdf</a>
dc.identifier.otherCONVID_98444450
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/77218
dc.description.abstractCyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detection. The main goal of this work is to empower defenders to set up a test environment with sufficient logging policies and simulating attacks themselves. The attack simulations will then be turned into actionable detection logic, with the help of the detection logic framework. The framework is designed to guide defenders through a quick and agile process of creating more broad detection logic with the emphasis on tactics, techniques and procedures of attacks. The results in this study approach the detection issues in a broad and general manner to help defenders understand the issue of threat detection, instead of providing readily implemented solutions.en
dc.format.extent540
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherFRUCT Oy
dc.relation.ispartofFRUCT '29 : Proceedings of the 29th Conference of Open Innovations Association FRUCT
dc.relation.ispartofseriesProceedings of Conference of Open Innovations Association FRUCT
dc.rightsCC BY-ND 4.0
dc.titleReducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202107274390
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-952-69244-5-8
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange465-474
dc.relation.issn2305-7254
dc.type.versionpublishedVersion
dc.rights.copyright© The Authors 2021
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceConference of Open Innovations Association
dc.subject.ysoorganisaatiot
dc.subject.ysokyberturvallisuus
dc.subject.ysopalomuurit (tietoturva)
dc.subject.ysotestaus
dc.subject.ysotietotekniikka
dc.subject.ysosimulointi
dc.subject.ysoverkkohyökkäykset
dc.subject.ysotietoturva
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p272
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p15779
jyx.subject.urihttp://www.yso.fi/onto/yso/p8471
jyx.subject.urihttp://www.yso.fi/onto/yso/p5462
jyx.subject.urihttp://www.yso.fi/onto/yso/p4787
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
dc.rights.urlhttps://creativecommons.org/licenses/by-nd/4.0/
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-ND 4.0