Pivot Attack Classification for Cyber Threat Intelligence

The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within the network to accomplish the strategic attack...

Full description

Bibliographic Details
Main Authors: Rafael Salema Marques, Haider al-Khateeb, Gregory Epiphaniou, Carsten Maple
Format: Article
Language:English
Published: Naif University Publishing House 2022-10-01
Series:Journal of Information Security and Cybercrimes Research
Subjects:
Online Access:https://journals.nauss.edu.sa/index.php/JISCR/article/view/1948