Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs
by
Tejedor-Romero, Marino
, Gimenez-Guzman, Jose Manuel
, Herranz-Oliveros, David
, Cruz-Piris, Luis
in
Algorithms
/ Clustering
/ Critical infrastructure
/ Cybersecurity
/ Cyberterrorism
/ Epidemiology
/ Graph theory
/ Graphs
/ Immunization
/ Infrastructure
/ Machine learning
/ Nodes
/ Performance evaluation
/ Propagation
/ Ransomware
/ Security software
/ Social networks
/ Threat evaluation
/ Threats
/ Unsupervised learning
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs
by
Tejedor-Romero, Marino
, Gimenez-Guzman, Jose Manuel
, Herranz-Oliveros, David
, Cruz-Piris, Luis
in
Algorithms
/ Clustering
/ Critical infrastructure
/ Cybersecurity
/ Cyberterrorism
/ Epidemiology
/ Graph theory
/ Graphs
/ Immunization
/ Infrastructure
/ Machine learning
/ Nodes
/ Performance evaluation
/ Propagation
/ Ransomware
/ Security software
/ Social networks
/ Threat evaluation
/ Threats
/ Unsupervised learning
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs
by
Tejedor-Romero, Marino
, Gimenez-Guzman, Jose Manuel
, Herranz-Oliveros, David
, Cruz-Piris, Luis
in
Algorithms
/ Clustering
/ Critical infrastructure
/ Cybersecurity
/ Cyberterrorism
/ Epidemiology
/ Graph theory
/ Graphs
/ Immunization
/ Infrastructure
/ Machine learning
/ Nodes
/ Performance evaluation
/ Propagation
/ Ransomware
/ Security software
/ Social networks
/ Threat evaluation
/ Threats
/ Unsupervised learning
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs
Journal Article
Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Cybersecurity threats, particularly those involving lateral movement within networks, pose significant risks to critical infrastructures such as Microsoft Active Directory. This study addresses the need for effective defense mechanisms that minimize network disruption while preventing attackers from reaching key assets. Modeling Active Directory networks as a graph in which the nodes represent the network components and the edges represent the logical interactions between them, we use centrality metrics to derive the impact of hardening nodes in terms of constraining the progression of attacks. We propose using Unsupervised Learning techniques, specifically density-based clustering algorithms, to identify those nodes given the information provided by their metrics. Our approach includes simulating attack paths using a snowball model, enabling us to analytically evaluate the impact of hardening on delaying Domain Administration compromise. We tested our methodology on both real and synthetic Active Directory graphs, demonstrating that it can significantly slow down the propagation of threats from reaching the Domain Administration across the studied scenarios. Additionally, we explore the potential of these techniques to enable flexible selection of the number of nodes to secure. Our findings suggest that the proposed methods significantly enhance the resilience of Active Directory environments against targeted cyber-attacks.
This website uses cookies to ensure you get the best experience on our website.