dc.contributorRodríguez Marcelo, Universidad de la República (Uruguay). Facultad de Ingeniería.
dc.contributorBetarte Gustavo, Universidad de la República (Uruguay). Facultad de Ingeniería
dc.contributorCalegari Daniel, Universidad de la República (Uruguay). Facultad de Ingeniería.
dc.creatorRodríguez, Marcelo
dc.creatorBetarte, Gustavo
dc.creatorCalegari, Daniel
dc.date.accessioned2021-09-01T12:32:53Z
dc.date.accessioned2022-10-28T20:15:30Z
dc.date.available2021-09-01T12:32:53Z
dc.date.available2022-10-28T20:15:30Z
dc.date.created2021-09-01T12:32:53Z
dc.date.issued2021
dc.identifierRodríguez, M., Betarte, G. y Calegari, D. A Process Mining-based approach for Attacker Profiling [Preprint]. Publicado en : IEEE URUCON 2021, Montevideo, Uruguay. 24-26 November, 2021.
dc.identifierhttps://hdl.handle.net/20.500.12008/29279
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/4983269
dc.description.abstractReacting adequately to cybersecurity attacks requires observing the attackers’ knowledge, skills, and behaviors to examine their influence over the system and understand the characteristics associated with these attacks. Profiling an attacker allows generating security countermeasures that can be adopted even from the design of the systems. For automated attackers, e.g. malware, it is possible to identify some structured behavior, i.e. a process-like behavior consisting of several (partial) ordered activities. Process Mining (PM) is a discipline from the organizational context that focuses on analyzing the event logs associated with executing the system’s processes to discover many aspects of process behavior. Few proposals are applying PM to attacker profiling. In this work, we explore the use of PM techniques to identify the behavior of cyber attackers. In particular, we illustrate, using an application example, how they can be adapted to an environment dominated by automated attackers. We discuss preliminary results and provide guidelines for future work.
dc.languageen
dc.publisherIEEE
dc.rightsLicencia Creative Commons Atribución - No Comercial - Sin Derivadas (CC - By-NC-ND 4.0)
dc.rightsLas obras depositadas en el Repositorio se rigen por la Ordenanza de los Derechos de la Propiedad Intelectual de la Universidad de la República.(Res. Nº 91 de C.D.C. de 8/III/1994 – D.O. 7/IV/1994) y por la Ordenanza del Repositorio Abierto de la Universidad de la República (Res. Nº 16 de C.D.C. de 07/10/2014)
dc.subjectCybersecurity
dc.subjectProcess mining
dc.subjectBehaviour
dc.subjectMalware
dc.titleA Process Mining-based approach for Attacker Profiling
dc.typePreprint


Este ítem pertenece a la siguiente institución