Mostrar el registro sencillo del ítem
dc.contributor.author | Villalón-Huerta, Antonio![]() |
es_ES |
dc.contributor.author | Marco-Gisbert, Héctor![]() |
es_ES |
dc.contributor.author | Ripoll-Ripoll, Ismael![]() |
es_ES |
dc.date.accessioned | 2023-09-08T18:00:46Z | |
dc.date.available | 2023-09-08T18:00:46Z | |
dc.date.issued | 2022-10 | es_ES |
dc.identifier.issn | 0167-4048 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10251/196133 | |
dc.description.abstract | [EN] The main contribution of this paper is to provide an accurate taxonomy for Persistence techniques, which allows the detection of novel techniques and the identification of appropriate countermeasures. Persistence is a key tactic for advanced offensive cyber operations. The techniques that achieve persistence have been largely analyzed in particular environments, but there is no suitable platform¿agnostic model to structure persistence techniques. This lack causes a serious problem in the modeling of activities of advanced threat actors, hindering both their detection and the implementation of countermeasures against their activities. In this paper we analyze previous work in this field and propose a novel taxonomy for persistence techniques based on persistence points, a key concept we introduce in our work as the basis for the proposed taxonomy. Our work will help analysts to identify, classify and detect compromises, significantly reducing the amount of effort needed for these tasks. It follows a logical structure that can be easy to expand and adapt, and it can be directly used in commonly accepted industry standards such as MITRE ATT&CK. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | Elsevier | es_ES |
dc.relation.ispartof | Computers & Security | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject | TTP | es_ES |
dc.subject | Persistence | es_ES |
dc.subject | Advanced Persistent Threat | es_ES |
dc.subject | Malware | es_ES |
dc.subject | MITRE ATT&CK | es_ES |
dc.subject.classification | ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES | es_ES |
dc.title | A taxonomy for threat actors' persistence techniques | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1016/j.cose.2022.102855 | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica | es_ES |
dc.description.bibliographicCitation | Villalón-Huerta, A.; Marco-Gisbert, H.; Ripoll-Ripoll, I. (2022). A taxonomy for threat actors' persistence techniques. Computers & Security. 121:1-14. https://doi.org/10.1016/j.cose.2022.102855 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | https://doi.org/10.1016/j.cose.2022.102855 | es_ES |
dc.description.upvformatpinicio | 1 | es_ES |
dc.description.upvformatpfin | 14 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 121 | es_ES |
dc.relation.pasarela | S\469978 | es_ES |