Mitre att&ck: State of the art and way forward
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques, and
procedures based on real-world observations. It has been used as a foundation for threat …
procedures based on real-world observations. It has been used as a foundation for threat …
5G core network control plane: Network security challenges and solution requirements
The control plane of the 5G Core Network (5GCN) is essential for ensuring reliable and high-
performance 5G communication. It provides critical network services such as authentication …
performance 5G communication. It provides critical network services such as authentication …
Sok: The mitre att&ck framework in research and practice
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …
techniques, has been widely adopted by the cybersecurity industry as well as by academic …
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection
Fifth Generation (5G) networks adopt the security-by-design principle to provide highly
secure and robust services. 5G Core (5GC) uses the Hypertext Transfer Protocol version 2 …
secure and robust services. 5G Core (5GC) uses the Hypertext Transfer Protocol version 2 …
Towards Securing the 6G Transition: A Comprehensive Empirical Method to Analyze Threats in O-RAN Environments
F Klement, W Liu… - IEEE Journal on Selected …, 2023 - ieeexplore.ieee.org
In this paper, we present a new methodology that enables the MITRE ATT&CK framework to
objectively assess specific threats in 6G Radio Access Networks (RANs). This helps address …
objectively assess specific threats in 6G Radio Access Networks (RANs). This helps address …
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and
procedures (TTP) based on real-world attack scenarios. It has been used in different sectors …
procedures (TTP) based on real-world attack scenarios. It has been used in different sectors …
Zero Trust and Advanced Persistent Threats: Who Will Win the War?
Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer
networks for political or industrial espionage. Because of the nature of cyberspace and ever …
networks for political or industrial espionage. Because of the nature of cyberspace and ever …
OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM
Y Jiang, Y Ren, Z Wang, Y Tang, S Lu… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
With the continuous development of information technology, the methods of network attacks
have been constantly evolving. Advanced Persistent Threat (APT) attacks are are very …
have been constantly evolving. Advanced Persistent Threat (APT) attacks are are very …
5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture
N Wehbe, HA Alameddine… - 2023 IFIP Networking …, 2023 - ieeexplore.ieee.org
Fifth Generation (5G) core network leverages the application-layer Hypertext Transfer
Protocol version 2 (HTTP/2) to enable the communication between the Network Functions …
Protocol version 2 (HTTP/2) to enable the communication between the Network Functions …