All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F23%3A00131720" target="_blank" >RIV/00216224:14610/23:00131720 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/CNS59707.2023.10288665" target="_blank" >http://dx.doi.org/10.1109/CNS59707.2023.10288665</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/CNS59707.2023.10288665" target="_blank" >10.1109/CNS59707.2023.10288665</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection

  • Original language description

    Resilient IT infrastructures must maintain the required service level even when faced with adversarial activity. Not only should we aim at minimizing the attack surface by hardening our cyber assets, but we should also elaborate on how to respond to running cyber attacks and immediate threats in situations where there is not enough time to patch vulnerabilities or other harden the infrastructures. In this work, we propose a lightweight approach to increasing resilience by projecting the attacker's lateral movement or the spread of malware. While related work builds on elaborate vulnerability assessment and analysis of complex attack paths, we were inspired by recent advances in rapid incident response, namely the recommendation of similar devices close to those already exploited. Using this approach, we can provide prompt recommendations using only the easily obtainable data on the cyber assets, such as device fingerprints. We prioritize promptness and applicability over precision, which complements the existing approaches.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

    <a href="/en/project/EH22_010%2F0003229" target="_blank" >EH22_010/0003229: MSCAfellow5_MUNI</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2023 IEEE Conference on Communications and Network Security (CNS)

  • ISBN

    9798350339451

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    1-6

  • Publisher name

    IEEE

  • Place of publication

    New York, NY

  • Event location

    Orlando

  • Event date

    Oct 2, 2023

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    001095064900006