Towards an Efficient Detection of Pivoting Activity
Authors | |
---|---|
Year of publication | 2021 |
Type | Article in Proceedings |
Conference | 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM) |
MU Faculty or unit | |
Citation | |
Web | https://ieeexplore.ieee.org/document/9464033 |
Keywords | Pivoting;Lateral Movement;Machine Learning;Flow Inspection;Intrusion Detection |
Attached files | |
Description | Pivoting is a technique used by cyber attackers to exploit the privileges of compromised hosts in order to reach their final target. Existing research on countering this menace is only effective for pivoting activities spanning within the internal network perimeter. When applying existing methods to include external traffic, the detection algorithm produces overwhelming entries, most of which unrelated to pivoting. We address this problem by identifying the major characteristics that are specific to potentially malicious pivoting. Our analysis combines human expertise with machine learning and is based on the inspection of real network traffic generated by a large organization. The final goal is the reduction of the unacceptable amounts of false positives generated by the state of the art methods. This paper paves the way for future researches aimed at countering the critical menace of illegitimate pivoting activities. |
Related projects: |