Singapore Institute of Technology
Browse

Investigating Patterns of Adversarial Techniques for Cyberattack Forensics

conference contribution
posted on 2025-10-10, 07:47 authored by Liming LuLiming Lu, Zhenlin Yu, Kok Keong Peter LohKok Keong Peter Loh, Isfaque Tuhin AL KaderiIsfaque Tuhin AL Kaderi
<p dir="ltr">Sophisticated cyberattacks require the expertise of forensic investigators to examine massive volumes of log data and uncover the intricacies of interconnected adversarial techniques across different attack stages. Due to variations in adversarial techniques and fragmented information, investigators often struggle with limited visibility in reconstructing events along the cyber kill chain. We identify statistical correlations of adversarial techniques by modeling their co-occurrences in advanced persistent threats as weighted connections in a graph. Our automated solution includes weighted knowledge graph construction, extraction of adversarial patterns through graph traversal, and detection of adversarial techniques guided by these patterns. Through attack simulations in two case studies, we validate the effectiveness of this approach in detecting adversarial techniques, supporting the identification of attack vectors and the reconstruction of partial kill chains even when some techniques bypass forensic investigation. This research highlights the potential to systematically investigate adversarial patterns, suggesting that future work could improve knowledge graph construction and extraction methods using advanced machine learning techniques for even better results.</p>

History

Related Materials

Journal/Conference/Book title

2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Publication date

2024-12-17

Version

  • Post-print

Rights statement

© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC