Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques

The rapid proliferation of cyberthreats necessitates a robust understanding of their evolution and associated tactics, as found in this study. A longitudinal analysis of these threats was conducted, utilizing a six-year data set obtained from a deception network, which emphasized its significance in...

Full description

Bibliographic Details
Main Author: Marshall S. Rich
Format: Article
Language:English
Published: MDPI AG 2023-08-01
Series:Analytics
Subjects:
Online Access:https://www.mdpi.com/2813-2203/2/3/35
_version_ 1827727553136164864
author Marshall S. Rich
author_facet Marshall S. Rich
author_sort Marshall S. Rich
collection DOAJ
description The rapid proliferation of cyberthreats necessitates a robust understanding of their evolution and associated tactics, as found in this study. A longitudinal analysis of these threats was conducted, utilizing a six-year data set obtained from a deception network, which emphasized its significance in the study’s primary aim: the exhaustive exploration of the tactics and strategies utilized by cybercriminals and how these tactics and techniques evolved in sophistication and target specificity over time. Different cyberattack instances were dissected and interpreted, with the patterns behind target selection shown. The focus was on unveiling patterns behind target selection and highlighting recurring techniques and emerging trends. The study’s methodological design incorporated data preprocessing, exploratory data analysis, clustering and anomaly detection, temporal analysis, and cross-referencing. The validation process underscored the reliability and robustness of the findings, providing evidence of increasingly sophisticated, targeted cyberattacks. The work identified three distinct network traffic behavior clusters and temporal attack patterns. A validated scoring mechanism provided a benchmark for network anomalies, applicable for predictive analysis and facilitating comparative study of network behaviors. This benchmarking aids organizations in proactively identifying and responding to potential threats. The study significantly contributed to the cybersecurity discourse, offering insights that could guide the development of more effective defense strategies. The need for further investigation into the nature of detected anomalies was acknowledged, advocating for continuous research and proactive defense strategies in the face of the constantly evolving landscape of cyberthreats.
first_indexed 2024-03-10T23:08:03Z
format Article
id doaj.art-f4f5f8eb9be24207b543f5a44f052f3d
institution Directory Open Access Journal
issn 2813-2203
language English
last_indexed 2024-03-10T23:08:03Z
publishDate 2023-08-01
publisher MDPI AG
record_format Article
series Analytics
spelling doaj.art-f4f5f8eb9be24207b543f5a44f052f3d2023-11-19T09:13:41ZengMDPI AGAnalytics2813-22032023-08-012361865510.3390/analytics2030035Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and TechniquesMarshall S. Rich0Cyberpsychology, Capitol Technology University, Laurel, MD 20708, USAThe rapid proliferation of cyberthreats necessitates a robust understanding of their evolution and associated tactics, as found in this study. A longitudinal analysis of these threats was conducted, utilizing a six-year data set obtained from a deception network, which emphasized its significance in the study’s primary aim: the exhaustive exploration of the tactics and strategies utilized by cybercriminals and how these tactics and techniques evolved in sophistication and target specificity over time. Different cyberattack instances were dissected and interpreted, with the patterns behind target selection shown. The focus was on unveiling patterns behind target selection and highlighting recurring techniques and emerging trends. The study’s methodological design incorporated data preprocessing, exploratory data analysis, clustering and anomaly detection, temporal analysis, and cross-referencing. The validation process underscored the reliability and robustness of the findings, providing evidence of increasingly sophisticated, targeted cyberattacks. The work identified three distinct network traffic behavior clusters and temporal attack patterns. A validated scoring mechanism provided a benchmark for network anomalies, applicable for predictive analysis and facilitating comparative study of network behaviors. This benchmarking aids organizations in proactively identifying and responding to potential threats. The study significantly contributed to the cybersecurity discourse, offering insights that could guide the development of more effective defense strategies. The need for further investigation into the nature of detected anomalies was acknowledged, advocating for continuous research and proactive defense strategies in the face of the constantly evolving landscape of cyberthreats.https://www.mdpi.com/2813-2203/2/3/35honeypotsintrusion detectionthreat huntingthreat intelligencecyberdefensecybersecurity
spellingShingle Marshall S. Rich
Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
Analytics
honeypots
intrusion detection
threat hunting
threat intelligence
cyberdefense
cybersecurity
title Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
title_full Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
title_fullStr Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
title_full_unstemmed Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
title_short Cyberpsychology: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques
title_sort cyberpsychology a longitudinal analysis of cyber adversarial tactics and techniques
topic honeypots
intrusion detection
threat hunting
threat intelligence
cyberdefense
cybersecurity
url https://www.mdpi.com/2813-2203/2/3/35
work_keys_str_mv AT marshallsrich cyberpsychologyalongitudinalanalysisofcyberadversarialtacticsandtechniques