(iii) simulate how the footprint of an APT evolves
over time when, to maintain stealth, the attackers have
constraints on the amount of potentially detectable ac-
tivity they can engage in. In our model, an attacker
must weigh the value of a given target node against
the probability of detection, which would impair the
attacker’s ability to persist within the target network.
Results from our evaluation have shown that the pro-
posed approach is promising and encourage further
research in this direction.
REFERENCES
(2017). 2017 cost of data breach study. Technical report,
Ponemon Institute.
Ablon, L. and Bogart, A. (2017). Zero days, thousands of
nights: The life and times of zero-day vulnerabilities
and their exploits. Research Reports RR-1751-RC,
RAND Corporation.
Albanese, M. and Jajodia, S. (2018). A graphical model
to assess the impact of multi-step attacks. Journal of
Defense Modeling and Simulation, 15(1):79–93.
Albanese, M., Jajodia, S., and Noel, S. (2012). Time-
efficient and cost-effective network hardening using
attack graphs. In Proc. of the 42nd Annual IEEE/IFIP
Intl. Conf. on Dependable Systems and Networks
(DSN 2012). IEEE.
Bateni, M. H., Hajiaghayi, M. T., and Liaghat, V. (2013).
Improved approximation algorithms for (budgeted)
node-weighted steiner problems. In Proc. of the 40th
Intl. Colloquium on Automata, Languages, and Pro-
gramming (ICALP 2013), pages 81–92. Springer.
Brandes, U. (2001). A faster algorithm for between-
ness centrality. Journal of Mathematical Sociology,
25(2):163–177.
Chen, P., Desmet, L., and Huygens, C. (2014). A study
on advanced persistent threats. In Proc. of the IFIP
Intl. Conf. on Communications and Multimedia Secu-
rity (CMS 2014), pages 63–72. Springer.
Fang, X., Zhai, L., Jia, Z., and Bai, W. (2014). A game
model for predicting the attack path of APT. In Proc.
of the 12th IEEE Intl. Conf. on Dependable, Auto-
nomic and Secure Computing (DASC 2014), pages
491–495. IEEE.
Friedberg, I., Skopik, F., Settanni, G., and Fiedler, R.
(2015). Combating advanced persistent threats: From
network event correlation to incident detection. Com-
puters & Security, 48:35–57.
Gore, R., Padilla, J., and Diallo, S. (2017). Markov chain
modeling of cyber threats. Journal of Defense Model-
ing and Simulation, 14(3):233–244.
Jafarian, J. H., Al-Shaer, E., and Duan, Q. (2014). Spatio-
temporal address mutation for proactive cyber agility
against sophisticated attackers. In Proc. of the 1st
ACM Workshop on Moving Target Defense (MTD
2014), pages 69–78. ACM.
Jasiul, B., Szpyrka, M., and
´
Sliwa, J. (2014). Detection and
modeling of cyber attacks with petri nets. Entropy,
16(12):6602–6623.
Johnson, D. S., Minkoff, M., and Phillips, S. (2000). The
prize collecting steiner tree problem: Theory and
practice. In Proc. of the 11th annual ACM-SIAM Sym-
posium on Discrete Algorithms (SODA 2000), pages
760–769. SIAM.
Kaspersky Labs. Targeted cyberattacks logbook. [Online,
retrieved May 24, 2018].
Kourtellis, N., De Francisci Morales, G., and Bonchi, F.
(2015). Scalable online betweenness centrality in
evolving graphs. IEEE Transactions on Knowledge
and Data Engineering, 27(9):2494–2506.
Langner, R. (2013). To kill a centrifuge: A technical analy-
sis of what stuxnet’s creators tried to achieve. Techni-
cal report, The Langner Group.
Marchetti, M., Pierazzi, F., Colajanni, M., and Guido, A.
(2016). Analysis of high volumes of network traffic
for Advanced Persistent Threat detection. Computer
Networks, 109(2):127–141.
Moss, A. and Rabani, Y. (2007). Approximation algorithms
for constrained node weighted steiner tree problems.
SIAM Journal on Computing, 37(2):460–481.
Sadeghian Sadeghabad, S. (2013). Node-weighted prize
collecting steiner tree and applications. Master’s the-
sis, University of Waterloo, Canada.
Spring, N., Mahajan, R., and Wetherall, D. (2002). Mea-
suring ISP topologies with Rocketfuel. SIGCOMM
Computer Communication Review, 32(4):133–145.
Symantec Security Response (2011). W32.Duqu: The pre-
cursor to the next Stuxnet. Technical report, Symantec
Corporation.
Symantec Security Response (2015). Regin: Top-tier es-
pionage tool enables stealthy surveillance. Technical
report, Symantec Corporation.
Virvilis, N., Vanautgaerden, B., and Serrano, O. S. (2014).
Changing the game: The art of deceiving sophisti-
cated attackers. In Proc. of the 6th Intl. Conf. on Cyber
Conflict (CyCon 2014), pages 87–97. IEEE.
Yoshida, Y. (2014). Almost linear-time algorithms for
adaptive betweenness centrality using hypergraph
sketches. In Proc. of the 20th ACM SIGKDD Intl.
Conf. on Knowledge Discovery and Data Mining
(KDD 2014), pages 1416–1425. ACM.
A Quantitative Framework to Model Advanced Persistent Threats
293