Cyber Attacker Profiling for Risk Analysis Based on Machine Learning
Abstract
:1. Introduction
- how do we specify the attacker model?
- how do we automatically calculate the values of attributes constituting the attacker model to determine the attacker profile using a non-expert technique based on the dynamic data gathered from logs and traffic during target system operation?
- where do we get the appropriate initial data for the experiments?
- do we really need an attacker model to analyze information security risks?
- a taxonomy of the attacker attributes and the specification of the relations between high-level and low-level attributes.
- a methodology for the attacker profile generation that links low-level attributes calculated from raw data and high-level attacker characteristics.
- experiments with a subset of low-level attacker attributes represented by a system event log to understand their applicability to the attacker type definition.
2. Related Works
- attack graph analysis;
- hidden Markov model;
- fuzzy inference;
- attributing cyber attacks using data mining techniques including neural networks, statistics, etc.
3. Attacker Profiling
3.1. Research Methodology
- Specify a formal attacker model (or profile) as the set of high-level attributes that are calculated using low-level attributes. The model is given in Section 3.2.
- Select high-level attacker characteristics as well as the features extracted from network traffic and event logs that can be used for their calculation. The selected attributes are given in Section 3.2.1 and Section 3.2.2.
- Specify the requirements of the dataset for the experiments and select the dataset. The requirements and the datasets themselves are described in Section 4.
- Conduct the experiments to check if the features selected in this research, namely, bash commands, allow us to outline different types of attackers. The experiments using different methods are presented in Section 5.
3.2. Attacker Model and Classification of Attributes
3.2.1. The High-Level Attributes
- Skills (or level of expertise)—this characteristic represents the attacker’s ability to implement complex attacks and use complex tools, experience and knowledge in the area, and ability to cover up the traces and stay in the system undetected for a long time (skills can be scored using different scales, for example as high, medium or low). In the scope of risk analysis tasks, higher skills indicate that the attacker can implement more complex attacks and bypass more complex security measures for a shorter time interval.
- Motivation—this characteristic represents the attacker’s desire to implement an attack successfully and can be represented by the number of attack attempts, time spent on the attack, and resources spent on the attack (motivation can be scored using different scales, for example as high, medium or low). In scope of risks analysis tasks, higher motivation indicates that the attacker will not stop in spite of security measures.
- Intention—this characteristic represents the attacker’s expectations from the successful attack implementation (for example, financial gain). In the scope of risk analysis tasks, this characteristic can indicate what attack path the attacker will choose.
- Used resources—this characteristic represents resources available to the attacker to implement the attack (for example, expensive equipment). Used resources and skills are connected in terms of the complexity of used resources. In terms of risks analysis, resources indicate whether the attacker can implement more complex attacks and bypass more complex security measures for a shorter time interval.
- Location—this characteristic represents the attacker position relative to the system (for example, outside the system, inside the system, and, if inside, where exactly the attacker is). In the scope of risks analysis, the task location indicates whether the attacker is close to the critical assets and what paths the attacker can select. It is connected to the system via the objects the attacker has access to, type of access and privileges and detected activity (events and incidents).
- Privileges—this characteristic represents the attacker’s privileges in the system (for example, user or administrator). In the scope of risks analysis, task location indicates whether the attacker is close to critical assets and what paths the attacker can select. It is connected to the system via the objects the attacker has access to, type of access and privileges, and detected activity (events and incidents).
- Goals (aims)—this characteristic represents the attacker’s goal. It differs from the “intention” characteristic by the fact that the goal is specified in terms of the system under attack (for example, elevate privileges on the server). In the scope of risks analysis, the task indicates what paths the attacker will select. It is connected to the system via the objects the attacker aims to compromise and the type of privileges the attacker aims to obtain.
- Access—this characteristic represents the type of the attacker’s access to the system’s objects (for example, physical or remote). In the scope of risks analysis, this indicates what paths the attacker can select. It is connected to the system via the objects the attacker has access to, type of access, and detected activity (events and incidents).
- Knowledge—this characteristic represents the attacker’s knowledge of the system under attack (for example, system topology). In the scope of risk analysis, this indicates what paths the attacker selected before and what actions the attacker has already implemented that, in turn, allows us to estimate the attacker’s skills. It is connected to the system via the objects the attacker has accessed before, type of access and privileges, and detected activity (events and incidents).
- Attack steps—this characteristic represents the type of the attacker’s actions in the system (for example, reconnaissance or exploit). In the scope of risk analysis, this indicates what paths the attacker can select. The attacker’s steps are also connected to the system under attack, namely, with the “location”, “access” and “privileges” characteristics and the detected activity (network traffic, events and incidents).
3.2.2. The Low-Level Attributes
4. Data Sources for Attacker Profiling
- the training dataset must contain a lot of attack actions against one information system performed by the attackers with different skills, resources, intentions and motivations;
- the dataset has to be labeled, as we need to know what actions were performed by which attacker.
5. Experiments with the Selected Dataset for Feature Selection
- dataset collection.
- dataset preprocessing.
- dataset analysis.
- model training and experiments.
- Fit_on_texts: Based on the frequency of bash_history texts, a dictionary with indexes was created using Keras Fit_on_texts. Each word was assigned an integer value based on their repetition frequency, with highly repeated words having the lowest integer value (i.e., ls command is 0). The resulting output can be seen in Table 7.
- Text_to_sequences: Each word from the input (bash_history) logs was replaced with the index from the dictionary made from fit_on_texts, as shown in Table 8.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
LSTM | Long short-term memory |
HMM | Hidden Markov model |
CTF | Capture the flag |
RNN | Recurrent neural networks |
CCE | Categorical cross-entropy |
SVM | Support vector machine |
References
- Ahmed, A.A.; Zaman, N.A.K. Attack Intention Recognition: A Review. Int. J. Netw. Secur. 2017, 19, 244–250. [Google Scholar]
- Abdlhamed, M.; Kifayat, K.; Shi, Q.; Hurst, W. Intrusion prediction systems. In Information Fusion for Cyber-Security Analytics; Springer: Berlin/Heidelberg, Germany, 2017; pp. 155–174. [Google Scholar]
- Kheir, N.; Cuppens-Boulahia, N.; Cuppens, F.; Debar, H. A service dependency model for cost-sensitive intrusion response. In Proceedings of the European Symposium on Research in Computer Security, Athens, Greece, 20–22 September 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 626–642. [Google Scholar]
- Casey, T. Threat agent library helps identify information security risks. Intel White Pap. 2007, 2, 1–11. [Google Scholar]
- Bar, A.; Shapira, B.; Rokach, L.; Unger, M. Identifying attack propagation patterns in honeypots using Markov chains modeling and complex networks analysis. In Proceedings of the 2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, 23–24 June 2016; pp. 28–36. [Google Scholar]
- Oosterhof, G.M. Cowrie. Available online: https://github.com/cowrie/cowrie (accessed on 27 January 2023).
- Shyla, S.I.; Sujatha, S. Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment. J. Intell. Syst. 2020, 29, 1626–1642. [Google Scholar] [CrossRef]
- Rid, T.; Buchanan, B. Attributing cyber attacks. J. Strateg. Stud. 2015, 38, 4–37. [Google Scholar] [CrossRef]
- Fraunholz, D.; Krohmer, D.; Anton, S.D.; Schotten, H.D. YAAS-On the Attribution of Honeypot Data. Int. J. Cyber Situational Aware 2017, 2, 31–48. [Google Scholar] [CrossRef]
- Howard, J.D.; Longstaff, T.A. A Common Language for Computer Security Incidents; Technical Report; Sandia National Lab. (SNL-NM): Albuquerque, NM, USA, 1998. [Google Scholar]
- Abomhara, M.; Køien, G.M. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
- Aliyev, V. Using Honeypots to Study Skill Level of Attackers Based on the Exploited Vulnerabilities in the Network. Ph.D. Thesis, Chalmers University of Technology, Göteborg, Sweden, 2010. [Google Scholar]
- Jhawar, R.; Lounis, K.; Mauw, S. A stochastic framework for quantitative analysis of attack-defense trees. In Proceedings of the International Workshop on Security and Trust Management, Crete, Greece, 26–27 September 2016; Springer: Cham, Switzerland, 2016; pp. 138–153. [Google Scholar]
- Pricop, E.; Mihalache, S.F. Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems. In Proceedings of the 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Bucharest, Romania, 25–27 June 2015; pp. 1–6. [Google Scholar]
- Mallikarjunan, K.N.; Shalinie, S.M.; Preetha, G. Real Time Attacker Behavior Pattern Discovery and Profiling Using Fuzzy Rules. J. Internet Technol. 2018, 19, 1567–1575. [Google Scholar]
- Perry, I.; Li, L.; Sweet, C.; Su, S.H.; Cheng, F.Y.; Yang, S.J.; Okutan, A. Differentiating and predicting cyberattack behaviors using lstm. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10–13 December 2018; pp. 1–8. [Google Scholar]
- Doynikova, E.; Novikova, E.; Kotenko, I. Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects. Information 2020, 11, 168. [Google Scholar] [CrossRef]
- Doynikova, E.; Novikova, E.; Gaifulina, D.; Kotenko, I. Towards Attacker Attribution for Risk Analysis. In Proceedings of the Risks and Security of Internet and Systems, Paris, France, 4–6 November 2020; Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 347–353. [Google Scholar]
- CPTC 2019 Dataset. Available online: http://mirrors.rit.edu/cptc/2019/mirrors/ (accessed on 26 November 2021).
- Schneier, B. Attack Trees: Modeling security threats. Dr. Dobb’s J. Softw. Tools 1999, 24, 21–29. [Google Scholar]
- Hariri, S.; Qu, G.; Dharmagadda, T.; Ramkishore, M.; Raghavendra, C.S. Impact analysis of faults and attacks in large-scale networks. IEEE Secur. Priv. 2003, 1, 49–54. [Google Scholar] [CrossRef]
- Ingols, K.; Chu, M.; Lippmann, R.; Webster, S.; Boyer, S. Modeling modern network attacks and countermeasures using attack graphs. In Proceedings of the 2009 Annual Computer Security Applications Conference, Honolulu, HI, USA, 7–11 December 2009; pp. 117–126. [Google Scholar]
- Kotenko, I.; Stepashkin, M. Attack graph based evaluation of network security. In Proceedings of the IFIP International Conference on Communications and Multimedia Security, Heraklion Crete, Greece, 19–21 October 2006; Springer: Berlin/Heidelberg, Germany, 2006; pp. 216–227. [Google Scholar]
- GhasemiGol, M.; Ghaemi-Bafghi, A.; Takabi, H. A comprehensive approach for network attack forecasting. Comput. Secur. 2016, 58, 83–105. [Google Scholar] [CrossRef]
- Doynikova, E.; Kotenko, I. Countermeasure selection based on the attack and service dependency graphs for security incident management. In Proceedings of the International Conference on Risks and Security of Internet and Systems, Lesbos Island, Greece, 20–22 July 2015; Springer: Cham, Switzerland, 2015; pp. 107–124. [Google Scholar]
- An, S.; Eom, T.; Park, J.S.; Hong, J.B.; Nhlabatsi, A.; Fetais, N.; Khan, K.M.; Kim, D.S. Cloudsafe: A tool for an automated security analysis for cloud computing. In Proceedings of the 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 602–609. [Google Scholar]
- Deshmukh, S.; Rade, R.; Kazi, D. Attacker behaviour profiling using stochastic ensemble of hidden markov models. arXiv 2019, arXiv:1905.11824. [Google Scholar]
- Katipally, R.; Yang, L.; Liu, A. Attacker behavior analysis in multi-stage attack detection system. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, USA, 12–14 October 2011; pp. 1–4. [Google Scholar]
- Shanmugam, B.; Idris, N.B. Hybrid intrusion detection systems (HIDS) using Fuzzy logic. Intrusion Detect. Syst. 2011, 135–155. [Google Scholar] [CrossRef]
- Dickerson, J.E.; Dickerson, J.A. Fuzzy network profiling for intrusion detection. In Proceedings of the PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society-NAFIPS (Cat. No. 00TH8500), Atlanta, GA, USA, 13–15 July 2000; pp. 301–306. [Google Scholar]
- Shanmugam, B.; Idris, N.B. Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks. In Proceedings of the 2009 International Conference of Soft Computing and Pattern Recognition, Malacca, Malaysia, 4–7 December 2009; pp. 212–217. [Google Scholar]
- Kudłacik, P.; Porwik, P.; Wesołowski, T. Fuzzy approach for intrusion detection based on user’s commands. Soft Comput. 2016, 20, 2705–2719. [Google Scholar] [CrossRef]
- Orojloo, H.; Abdollahi Azgomi, M. Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems. Secur. Commun. Netw. 2016, 9, 6111–6136. [Google Scholar] [CrossRef]
- Watters, P.A.; McCombie, S.; Layton, R.; Pieprzyk, J. Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP). J. Money Laund. Control. 2012, 15, 430–441. [Google Scholar] [CrossRef]
- Munaiah, N.; Rahman, A.; Pelletier, J.; Williams, L.; Meneely, A. Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. In Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), Porto de Galinhas, Brazil, 19–20 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Wang, L.; Islam, T.; Long, T.; Singhal, A.; Jajodia, S. An attack graph-based probabilistic security metric. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, London, UK, 13–16 July 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 283–296. [Google Scholar]
- Kotenko, I.; Doynikova, E. Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks. In Proceedings of the 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016), Heraklion, Greece, 7–19 February 2016; pp. 558–565. [Google Scholar]
- Doynikova, E.V.; Kotenko, I.V. Improvement of attack graphs for cybersecurity monitoring: Handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection. Inform. Autom. 2018, 57, 211–240. [Google Scholar] [CrossRef] [Green Version]
- Rashid, T.; Agrafiotis, I.; Nurse, J.R. A new take on detecting insider threats: Exploring the use of hidden markov models. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, Vienna, Austria, 28 October 2016; pp. 47–56. [Google Scholar]
- Cayirci, E.; Rong, C. Security in Wireless ad Hoc and Sensor Networks; John Wiley & Sons: Hoboken, NJ, USA, 2008. [Google Scholar]
- DEFCON 26 CTF Homepage. Available online: https://media.defcon.org/DEF%20CON%2026/ (accessed on 26 November 2021).
- Splunk Official Web Site. Available online: https://www.splunk.com/ (accessed on 26 November 2021).
- Jha, A.; Novikova, E.S.; Tokarev, D.; Fedorchenko, E.V. Feature Selection for Attacker Attribution in Industrial Automation & Control Systems. In Proceedings of the 2021 IV International Conference on Control in Technical Systems (CTS), Saint Petersburg, Russia, 21–23 September 2021; pp. 220–223. [Google Scholar]
Approach | Input Data Source | Type of Metrics | Advantages & Limitations |
---|---|---|---|
Attack graph analysis [3,20,22,23,24,36,37,38] | Network topology, software and hardware configuration, relationships between users and services, vulnerabilities | High-level (attacker skills, location) | Focus on the vulnerabilities existing in the system. Extensive usage of the expert knowledge to quantify metrics. |
HMM-based approach [5,13,14,15,27,28,39,40] | Events generated by honeypots and network traffic with emulated attacks | High-level (goals, intention, level of expertise) | There is no link of the low level events to high-level attributes. Not unified (in terms of attacker profile and metrics). |
Fuzzy inference [32,33] | Can be high-level abstract data or qualitative attributes of the log events | High-level (skills, knowledge, access (location), interaction) or low-level (keyboard keys’ sequences, characteristic data sequences) | Deals with uncertainty in the data. Limited with detection of abnormal user’s behaviour. Highly depends on the correct synthesis of information flows |
Attack attributing [8,9,16] | Network traffic data | High-level (skill, resources, motivation, intention) and low-level (IP addresses, email addresses, domain names, small pieces of text, hash, cookies etc.) | Attempt to link raw data and high-level metrics. Techniques for calculation of specific metrics require further development. Specific classes of attackers are not considered. |
This approach | Network traffic data and event logs | High-level (skills, education etc.) and low-level (the intensity of receiving and sending network packets; bytes per time interval or the intensity of receiving and sending bytes; TCP dialogs; TCP-points from network traffic, i.e., pairs IP address and port; IP-points; number of ports; number of protocols; IP dialogs; IP-address; bash commands etc.) | Linking raw data (low-level metrics) and high-level metrics to profile the attacker. In progress. |
High-Level Attributes | Group of Low-Level Attributes | Low-Level Attributes |
---|---|---|
Skills | Observable attack characteristics that characterize ability to cover up the traces. It is assumed that in case of higher skills the incidents rate will be lower and location in network will be deeper. | Frequency of alerts (malware detection rate), Distribution of alerts |
Temporal characteristics that could be used to characterize tools complexity (also used scripts and commands should be considered) | Number of used exploits (known exploits, exploits with high complexity) | |
Temporal characteristics that characterize attacker experience and knowledge (here focus is done on the complexity of actions, their severity and performance) | Frequency of alerts, Distribution of alerts, Frequency of attacks, Distribution of attacks, Command per time interval, Packets per time interval, Bytes per time interval, Inter-arrival time, Session duration, IP dialogs, TCP dialogs, Files per time interval, Inter-session time, Sessions per time interval, Number of ports, Number of protocols, Average alerts severity, Number of used vulnerabilities, Number of used exploits. | |
Motivation | Temporal characteristics | Frequency of alerts, Frequency of attacks, Command per time interval, Packets per time interval, Bytes per time interval, Inter-arrival time, IP dialogs, TCP dialogs, Files per time interval, Inter-session time, Sessions per time interval, Number of ports, Number of protocols, Number of used exploits. |
Intention | Origin and Target characteristics | IP addresses from network traffic/log. Domain names from network traffic/log. Operating System from network traffic/log. Host from network traffic/events log. Port obtained from network traffic or events log, Requested network resources |
Observable attack characteristics | Alert signature, Alert category, Vulnerability, Exploits | |
Content characteristics that describe system state after attack action, resources state after attack action (e.g., modified, removed) | Alert signature, Alert category, Alert severity, Vulnerability, Small pieces of text, Hash, Commands, Exploits | |
Resources | Attack coverage | Distribution of attacks, Number of ports, Number of protocols, Number of used exploits |
Temporal characteristics | Frequency of attacks | |
Inter-arrival time, File per time interval, Packet per time interval, Bytes per time interval, Command per time interval, Inter-session time, Sessions per time interval |
Team Name | Num. of Unique Commands |
---|---|
central_team0 | 1480 |
central_team1 | 1368 |
central_team2 | 1308 |
central_team3 | 483 |
central_team4 | 1715 |
central_team5 | 1098 |
Before | After | ||
---|---|---|---|
_raw | host | _raw | host |
exit | world-build-t0-vdi-ns01 | exit | world-build-to |
vim db.dinobank.us | world-build-t0-vdi-ns01 | vim db.dinobank.us | world-build-t0 |
Is | world-build-t0-vdi-ns01 | Is | world-build-t0 |
cd/var/cache/bind/ | world-build-t0-vdi-ns01 | /var/cache/bind/ | world-build-t0 |
nc -lvnp 40,000 | western-t9-vdi-kali05 | nc -lvnp 4444 | western-t9 |
ifconfig | western-t9-vdi-kali05 | nc -nlvp 100 | western-t9 |
ssh 10.0.1.33 | western-t9-vdi-kali05 | msfconsole | western-t9 |
Team Label | Central-t0 | International-t0 | Nationals-t0 | New-England-t0 | North-Eastern-t0 | South-Eastern-t0 | Western-t1 |
---|---|---|---|---|---|---|---|
0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
8 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
11 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
22 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
29 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
39 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
48 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
Team Name | Label |
---|---|
central-t0 | 0 |
international-t0 | 8 |
nationals-t0 | 11 |
newengland-t0 | 22 |
northeastern-t0 | 29 |
southeastern-t0 | 39 |
western-t1 | 48 |
Word Index |
---|
’install’: 12 |
’cat’: 13 |
’cd’: 14 |
’ssh’: 15 |
’sudo’: 48 |
’cmd’: 987 |
’psexec’: 966 |
Bash-History Data | Index Sequences |
---|---|
[’grep -ri 8089 *’] | [40, 1962, 284] |
[’clear’] | [526] |
[’cd etherex/frontend/’] | [14, 1963, 3653] |
[’ls’] | [60] |
[’rm -rf tmp/’] | [93, 487, 206] |
Parameter | Value |
---|---|
Type | Sequential |
Number of LSTM neurons | 64 |
Dropout | 0.7 |
Loss | CCE (Categorical Cross-Entropy) |
Optimizer | Adam |
Batch-Size | 100 |
Epoch | 20 |
Activation | Softmax |
Test/Train Split 25% | |
Additional Layer | Embedding Layer |
Algorithm | Training Accuracy (%) | Validation Accuracy (%) |
---|---|---|
SVM-Classifier | 25 | 14 |
Random Forest | 23.2 | 15 |
Ours—LSTM Classifier | 61 | 48 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kotenko, I.; Fedorchenko, E.; Novikova, E.; Jha, A. Cyber Attacker Profiling for Risk Analysis Based on Machine Learning. Sensors 2023, 23, 2028. https://doi.org/10.3390/s23042028
Kotenko I, Fedorchenko E, Novikova E, Jha A. Cyber Attacker Profiling for Risk Analysis Based on Machine Learning. Sensors. 2023; 23(4):2028. https://doi.org/10.3390/s23042028
Chicago/Turabian StyleKotenko, Igor, Elena Fedorchenko, Evgenia Novikova, and Ashish Jha. 2023. "Cyber Attacker Profiling for Risk Analysis Based on Machine Learning" Sensors 23, no. 4: 2028. https://doi.org/10.3390/s23042028
APA StyleKotenko, I., Fedorchenko, E., Novikova, E., & Jha, A. (2023). Cyber Attacker Profiling for Risk Analysis Based on Machine Learning. Sensors, 23(4), 2028. https://doi.org/10.3390/s23042028