tasty是什么意思| 三高不能吃什么食物| 记过处分有什么影响| 大便很黄是什么原因| 脚底脱皮用什么药| 泌乳素偏高是什么原因| 快照是什么意思| 经常拉肚子什么原因| 王八是什么| 什么是事业编| 孕妇梦见猪是什么意思| 草鱼喜欢吃什么食物| 什么叫伪娘| cpi下降意味着什么| 10月15是什么星座| 古代新疆叫什么| 坤造是什么意思| 文胸是什么意思| 不割包皮有什么影响| 公务员和事业编有什么区别| 妯娌关系是什么意思| 口腔溃疡需要补充什么维生素| 郁闷是什么意思| 古井贡酒是什么香型| 睾丸瘙痒是什么原因| 狗狗狂犬疫苗什么时候打| 月经周期变短是什么原因| 心花怒放是什么意思| 春秋是什么时期| cto是什么意思| 1981年是什么年| 登字五行属什么| 老虎头上为什么有王字| 口若悬河是什么意思| 教育的本质是什么| 肛门痒痒的是什么原因| 钠对人体有什么作用| 疮疖是什么意思| 血块多是什么原因| 煲蛇汤放什么材料好| 平均红细胞体积偏高说明什么| 手淫过度有什么症状| 夜代表什么生肖| 12月2日是什么星座| 十一月份属于什么星座| 国资委什么级别| 迪丽热巴是什么族| 什么的雪莲| 银杯子喝水有什么好处| 翻来覆去是什么意思| 阳痿是什么| 小麦和大麦有什么区别| 大便干硬是什么原因| 为什么第一次没有出血| 回族信仰什么教| 尿路感染看什么科| 口蜜腹剑是什么意思| 等是什么生肖| dep是什么意思| 计算机科学与技术是学什么的| 仕字五行属什么| 海姆立克急救法是什么| 戴银镯子对身体有什么好处| 透析到什么程度会死亡| 脚上长鸡眼去医院挂什么科| 做水煮鱼用什么鱼最好| 腿部发痒是什么原因引起的| 九王念什么| 经常性偏头疼是什么原因| 右肺下叶钙化灶是什么意思| 肛周脓肿用什么药| 肾阴虚吃什么中药| 尿蛋白十一是什么意思| 肺结节看什么科| 羊属于什么科| 胆结石不能吃什么食物| 拜读是什么意思| 抽烟为什么会头晕| 什么是义齿| 龟苓膏不能和什么一起吃| 智商是什么意思| 八月底什么星座| 大便一粒粒是什么原因| 什么水果利尿| 有黄痰是什么原因| 什么水果维生素含量高| 五行属土缺命里缺什么| 加菲猫是什么品种| 在什么什么前面| 什么是气胸有什么症状| cpp是什么意思| 锁骨上的痣代表什么| 五七年属什么生肖| 母鸡什么意思| 老婆的妹妹叫什么| 未可以加什么偏旁| 3个火读什么| 今天是什么日子| 磊字五行属什么| 玻璃是什么垃圾| 膝盖痛吃什么药| 愤青是什么意思| o型血的孩子父母是什么血型| 脚拇指发麻是什么原因| 腮腺炎吃什么药好| 儿童鼻炎吃什么药| 雪松香是什么味道| 单核细胞高是什么意思| 乙肝三项检查什么| 国防部长什么级别| 六月二十三是什么日子| 均可是什么意思| 肚子疼恶心想吐吃什么药| 股票解禁是什么意思| hpv什么症状| 身上起红斑是什么原因| 小孩热感冒吃什么药好| 5个月宝宝吃什么辅食| 手老是出汗是什么原因| 睡觉喜欢流口水是什么原因| 拿手机手抖是什么原因| 早上八点是什么时辰| 高硼硅是什么材质| 哮喘是什么| 参加追悼会穿什么衣服| 码农是什么意思| 鎏是什么意思| 头痛到医院挂什么科| 回家心切什么意思| 快速眼动是什么意思| 蘸什么意思| 什么是闭合性跌打损伤| 心口痛是什么原因引起的| 焦虑症吃什么| 前庭神经炎吃什么药| 伤口换药挂什么科啊| 鸡蛋壳薄是什么原因| 挚友什么意思| 暗喻是什么意思| 奢靡是什么意思| nub是什么意思| 云南白药治什么| 清考是什么意思| 输血前常规检查是什么| nova是什么牌子| 斑鸠吃什么| 身份证带x是什么意思| 性价比高什么意思| 民族是什么意思| 更年期的女人有什么症状表现| loc是什么意思| 5D电影是什么效果| 榄仁叶是什么树的叶子| 头皮挂什么科| 三净肉指什么| 孕检nt主要检查什么| 胃烧心吃什么食物好| 晕车药吃多了有什么副作用| 男孩学什么专业有前途| 糖类抗原是检查什么的| 角瓜是什么| 男生为什么喜欢摸胸| 双肺间质性改变是什么意思| 皮下出血是什么原因| 左手臂发麻是什么原因| 五行属金什么字最好| 大什么什么针| 景气是什么意思| 左肩后背疼是什么原因| 副高是什么职称| ct能检查出什么| 清新的什么填空| 黄金是什么药材| 北边是什么生肖| 杨新鸣包贝尔什么关系| 血常规一般查什么病| 小透明是什么意思| o血型的人有什么特点| 开瑞坦是什么药| 什么人骗别人也骗自己| 竖心旁有什么字| 电灯是什么时候发明的| 不现实什么意思| 尿道感染要吃什么药才能快速治好| 复方木尼孜其颗粒治什么病| egfr医学上是什么意思| 八面玲珑是什么数字| 舌头裂缝是什么原因| 支原体培养及药敏是检查什么| 左腰疼痛是什么原因男性| 按摩有什么好处| 吃什么蔬菜能降血脂| 血红蛋白高是什么原因| 肾疼是因为什么| 宫腔线不清晰什么意思| 做面条用什么面粉| 87年属什么| 10月1日什么星座| 为什么一来月经就头疼| 痔疮有什么特征| 女生怀孕的前兆是什么| 2020是什么生肖| 直肠炎是什么原因引起的| 胃一阵一阵的疼是什么原因| 中药什么时候吃最好| 扮猪吃老虎什么意思| 西兰花不能和什么一起吃| 献血有什么坏处| 一级医院是什么意思| 小孩老放屁是什么原因| 什么最赚钱| 1996年是属什么生肖| 大黄和芒硝混合外敷有什么作用| 甲亢看什么指标| 1995年属什么生肖| 肝气不舒有什么症状| 经常做春梦是什么原因| 脂肪肝吃什么中药| 紫荆花代表什么生肖| 2009是什么年| 孕妇能喝什么饮料| 碧霄是什么意思| 什么情况会导致月经推迟不来| 色带是什么| 验尿能检查出什么| 没晨勃说明什么问题| 梦到黑狗是什么意思| 秋葵补什么| 笑靥如花什么意思| 舌苔厚白应该吃什么| sdeer是什么牌子| aq什么意思| 灵芝泡水喝有什么好处| 鹅口疮是什么| ras医学上是什么意思| 胃疼恶心吃什么药效果好| 奥氮平片是什么药| 螺旋菌感染有什么危害| 高见是什么意思| 乳房里面有硬块是什么原因| 去香港澳门旅游需要准备什么| 看皮肤挂什么科| 什么是种草| hr阳性是什么意思| 星期五右眼皮跳是什么预兆| 心脏彩超ef是什么意思| 头发不长是什么原因| 乙型肝炎表面抗体阳性是什么意思| 富强粉是什么面粉| 梦见牙齿掉光了是什么征兆| 脐橙是什么意思| 梦到吃屎是什么意思| 慢性萎缩性胃炎c2是什么意思| 秘辛是什么意思| 蒂芙尼算什么档次| 肠胃性感冒吃什么药| 急性肠胃炎打什么点滴| 血清肌酐高说明什么问题| 尿液分析是检查什么| 彪子是什么意思| 吃什么可以提高新陈代谢| 蜂蜜对人体有什么好处和功效| 张飞穿针歇后语下一句是什么| 植物的根有什么作用| 百度Jump to content

【新时代新气象新作为】江苏新经济创造富民新样本

From Wikipedia, the free encyclopedia
Intrusion kill chain for information security[1]
百度 《宗教事务条例》就是一个推动社会向前的一股正能量。

The cyber kill chain is the process by which perpetrators carry out cyberattacks.[2] Lockheed Martin adapted the concept of the kill chain from a military setting to information security, using it as a method for modeling intrusions on a computer network.[3] The cyber kill chain model has seen some adoption in the information security community.[4] However, acceptance is not universal, with critics pointing to what they believe are fundamental flaws in the model.[5]

Attack phases and countermeasures

[edit]

Computer scientists at Lockheed-Martin corporation described a new "intrusion kill chain" framework or model to defend computer networks in 2011.[6] They wrote that attacks may occur in phases and can be disrupted through controls established at each phase. Since then, the "cyber kill chain" has been adopted by data security organizations to define phases of cyberattacks.[7]

A cyber kill chain reveals the phases of a cyberattack: from early reconnaissance to the goal of data exfiltration.[8] The kill chain can also be used as a management tool to help continuously improve network defense. According to Lockheed Martin, threats must progress through several phases in the model, including:

  1. Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network.
  2. Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities.
  3. Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USB drives)
  4. Exploitation: Malware weapon's program code triggers, which takes action on target network to exploit vulnerability.
  5. Installation: Malware weapon installs an access point (e.g., "backdoor") usable by the intruder.
  6. Command and Control: Malware enables intruder to have "hands on the keyboard" persistent access to the target network.
  7. Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom.

Defensive courses of action can be taken against these phases:[9]

  1. Detect: Determine whether an intruder is present.
  2. Deny: Prevent information disclosure and unauthorized access.
  3. Disrupt: Stop or change outbound traffic (to attacker).
  4. Degrade: Counter-attack command and control.
  5. Deceive: Interfere with command and control.
  6. Contain: Network segmentation changes

A U.S. Senate investigation of the 2013 Target Corporation data breach included analysis based on the Lockheed-Martin kill chain framework. It identified several stages where controls did not prevent or detect progression of the attack.[1]

Alternatives

[edit]

Different organizations have constructed their own kill chains to try to model different threats. FireEye proposes a linear model similar to Lockheed-Martin's. In FireEye's kill chain the persistence of threats is emphasized. This model stresses that a threat does not end after one cycle.[10]

  1. Reconnaissance: This is the initial phase where the attacker gathers information about the target system or network. This could involve scanning for vulnerabilities, researching potential entry points, and identifying potential targets within the organization.
  2. Initial Intrusion: Once the attacker has gathered enough information, they attempt to breach the target system or network. This could involve exploiting vulnerabilities in software or systems, utilizing social engineering techniques to trick users, or using other methods to gain initial access.
  3. Establish a Backdoor: After gaining initial access, the attacker often creates a backdoor or a persistent entry point into the compromised system. This ensures that even if the initial breach is discovered and mitigated, the attacker can still regain access.
  4. Obtain User Credentials: With a foothold in the system, the attacker may attempt to steal user credentials. This can involve techniques like keylogging, phishing, or exploiting weak authentication mechanisms.
  5. Install Various Utilities: Attackers may install various tools, utilities, or malware on the compromised system to facilitate further movement, data collection, or control. These tools could include remote access Trojans (RATs), keyloggers, and other types of malicious software.
  6. Privilege Escalation / Lateral Movement / Data Exfiltration: Once inside the system, the attacker seeks to elevate their privileges to gain more control over the network. They might move laterally within the network, trying to access more valuable systems or sensitive data. Data exfiltration involves stealing and transmitting valuable information out of the network.
  7. Maintain Persistence: This stage emphasizes the attacker's goal to maintain a long-term presence within the compromised environment. They do this by continuously evading detection, updating their tools, and adapting to any security measures put in place.

Critiques

[edit]

Among the critiques of Lockheed Martin's cyber kill chain model as threat assessment and prevention tool is that the first phases happen outside the defended network, making it difficult to identify or defend against actions in these phases.[11] Similarly, this methodology is said to reinforce traditional perimeter-based and malware prevention-based defensive strategies.[12] Others have noted that the traditional cyber kill chain isn't suitable to model the insider threat.[13] This is particularly troublesome given the likelihood of successful attacks that breach the internal network perimeter, which is why organizations "need to develop a strategy for dealing with attackers inside the firewall. They need to think of every attacker as [a] potential insider".[14]

Unified kill chain

[edit]
The unified kill chain consists of 18 unique attack phases that can occur in advanced cyber attacks.

The Unified Kill Chain was developed in 2017 by Paul Pols in collaboration with Fox-IT and Leiden University to overcome common critiques against the traditional cyber kill chain, by uniting and extending Lockheed Martin's kill chain and MITRE's ATT&CK framework (both of which are based on the "Get In, Stay In, and Act" model constructed by James Tubberville and Joe Vest). The unified version of the kill chain is an ordered arrangement of 18 unique attack phases that may occur in an end-to-end cyberattack, which covers activities that occur outside and within the defended network. As such, the unified kill chain improves over the scope limitations of the traditional kill chain and the time-agnostic nature of tactics in MITRE's ATT&CK. The unified model can be used to analyze, compare, and defend against end-to-end cyberattacks by advanced persistent threats (APTs).[15] A subsequent whitepaper on the unified kill chain was published in 2021.[16]

References

[edit]
  1. ^ a b "U.S. Senate-Committee on Commerce, Science, and Transportation-A "Kill Chain" Analysis of the 2013 Target Data Breach-March 26, 2014" (PDF). Archived from the original (PDF) on October 6, 2016.
  2. ^ Skopik & Pahi 2020, p. 4.
  3. ^ Higgins, Kelly Jackson (January 12, 2013). "How Lockheed Martin's 'Kill Chain' Stopped SecurID Attack". DARKReading. Archived from the original on 2025-08-14. Retrieved June 30, 2016.
  4. ^ Mason, Sean (December 2, 2014). "Leveraging The Kill Chain For Awesome". DARKReading. Archived from the original on 2025-08-14. Retrieved June 30, 2016.
  5. ^ Myers, Lysa (October 4, 2013). "The practicality of the Cyber Kill Chain approach to security". CSO Online. Archived from the original on March 19, 2022. Retrieved June 30, 2016.
  6. ^ "Lockheed-Martin Corporation-Hutchins, Cloppert, and Amin-Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains-2011" (PDF). Archived (PDF) from the original on 2025-08-14. Retrieved 2025-08-14.
  7. ^ Greene, Tim (5 August 2016). "Why the 'cyber kill chain' needs an upgrade". Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  8. ^ "The Cyber Kill Chain or: how I learned to stop worrying and love data breaches". 2025-08-14. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  9. ^ John Franco. "Cyber Defense Overview: Attack Patterns" (PDF). Archived (PDF) from the original on 2025-08-14. Retrieved 2025-08-14.
  10. ^ Kim, Hyeob; Kwon, HyukJun; Kim, Kyung Kyu (February 2019). "Modified cyber kill chain model for multimedia service environments". Multimedia Tools and Applications. 78 (3): 3153–3170. doi:10.1007/s11042-018-5897-5. ISSN 1380-7501.
  11. ^ Laliberte, Marc (September 21, 2016). "A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack". DARKReading. Archived from the original on 2025-08-14.
  12. ^ Engel, Giora (November 18, 2014). "Deconstructing The Cyber Kill Chain". DARKReading. Archived from the original on 2025-08-14. Retrieved June 30, 2016.
  13. ^ Reidy, Patrick. "Combating the Insider Threat at the FBI" (PDF). BlackHat USA 2013. Archived (PDF) from the original on 2025-08-14. Retrieved 2025-08-14.
  14. ^ Devost, Matt (February 19, 2015). "Every Cyber Attacker is an Insider". OODA Loop. Archived from the original on August 26, 2021. Retrieved August 26, 2021.
  15. ^ Pols, Paul (December 7, 2017). "The Unified Kill Chain" (PDF). Cyber Security Academy. Archived (PDF) from the original on May 17, 2021. Retrieved May 17, 2021.
  16. ^ Pols, Paul (May 17, 2021). "The Unified Kill Chain". UnifiedKillChain.com. Archived from the original on May 17, 2021. Retrieved May 17, 2021.

Further reading

[edit]
硬伤是什么意思 00年属龙的是什么命 江西庐山产什么茶 艾滋病皮肤有什么症状 ad医学上是什么意思
鸡飞狗跳是指什么生肖 心脏跳的快是什么原因 大便出血吃什么药好得快 bigbang是什么意思 胃胀吃点什么药
好吧是什么意思 房性心动过速是什么意思 什么蛇没有毒 姓傅的男孩取什么名字 枯木逢春是什么意思
发物是什么 收尾是什么意思 杞人忧天是什么故事 juicy是什么意思 胆红素是什么
包茎是什么意思hcv9jop6ns0r.cn 哈密瓜为什么会苦hcv8jop1ns1r.cn 怀孕前壁和后壁有什么区别hcv9jop6ns5r.cn 回族为什么不吃猪肉hcv9jop3ns9r.cn 属猪本命佛是什么佛hcv8jop5ns8r.cn
低回声斑块是什么意思hcv8jop8ns1r.cn 淀粉样变性是什么病hcv8jop3ns7r.cn 检查乳房挂什么科hcv9jop3ns2r.cn 喝石斛水有什么禁忌hcv8jop4ns5r.cn 血清载脂蛋白b偏高是什么意思96micro.com
gmail是什么邮箱hcv8jop6ns0r.cn 阑尾炎是什么病hcv9jop7ns1r.cn 防风通圣颗粒治什么病hcv9jop0ns0r.cn 尿胆原弱阳性什么意思520myf.com 红酒是什么味道hcv7jop7ns2r.cn
窦性心律早期复极是什么意思hcv8jop9ns9r.cn 怀孕有褐色分泌物是什么原因hcv8jop5ns1r.cn 酸奶有什么好处hcv8jop2ns3r.cn 脚气泡脚用什么泡最好ff14chat.com 煲什么汤去湿气最好hcv9jop6ns4r.cn
百度