scispace - formally typeset
Search or ask a question

How is lateral movement attack perpetrated? 


Best insight from top research papers

Lateral movement attacks are perpetrated by compromising a trusted user account within an enterprise network and using it to attack other trusted users, gradually gaining higher privileges. These attacks are difficult to model and detect due to the unwitting role of users and their slow and low-profile nature . Attackers perform lateral movement attacks by progressively moving from one system to another in the network, exploiting credentials, escalating privileges, and ultimately targeting critical systems . After infiltrating a network, attackers stay undetected for long periods of time and perform network reconnaissance to compromise additional systems . To detect and prioritize potentially compromised hosts, security administrators can reconstruct attacker paths using indicators of compromise (IoCs) and methods such as k-shortest-paths and biased random walks . Machine learning techniques can also be leveraged to detect susceptible hosts targeted by advanced persistent threats (APTs) .

Answers from top 5 papers

More filters
Papers (5)Insight
Book ChapterDOI
Aditya K Sood, Richard Enbody 
01 Jan 2014
Lateral movement attacks are perpetrated by performing network reconnaissance, compromising additional systems, and using tools like RATs to exploit vulnerabilities and maintain control in the network.
The paper does not provide information on how lateral movement attacks are perpetrated.
The paper proposes an approach to reconstruct the lateral movement of attackers in a network using indicators of compromise (IoCs).
Open accessDissertation
01 Jan 2016
6 Citations
Lateral movement attacks are performed by progressively moving from one system to another in a network, exploiting credentials and using legitimate computer features and tools.
Lateral movement attacks involve compromising a trusted user account to gain access to the enterprise network and then attacking other trusted users.

Related Questions

What is lateral social comparison?5 answersLateral social comparison involves comparing multiple cases or entities side by side, as opposed to contrasting one entity with a familiar background. This method of comparison is utilized in various contexts, such as in anthropology, where it has been overshadowed by frontal comparison in recent years. In organizational settings, lateral social comparisons can evoke both positive and negative responses, affecting individuals with a high social-comparison orientation. Moreover, in the study of cold case homicide survivors, lateral comparison is used as a method to define grief, with survivors engaging in downward elevation, lateral comparison, and upward contacts to cope with their trauma. Overall, lateral social comparison plays a significant role in shaping perceptions, motivations, and coping strategies across different domains.
What plyometric exercises increase lateral jump distance most effectively?5 answersPlyometric exercises that focus on single-leg jumps, particularly asymmetrical-continuous plyometric exercises, have shown to be highly effective in improving lateral jump distance. Specifically, single-leg plyometric training has been found to be more beneficial in enhancing both single and double-leg jumping performance compared to bilateral training. Additionally, asymmetrical-continuous plyometric exercises have demonstrated significant correlations with sprints, indicating their effectiveness in improving speed abilities. Therefore, incorporating single-leg plyometric exercises, especially those emphasizing asymmetrical-continuous jumps, can be a key strategy to enhance lateral jump distance effectively.
Which is more involved in elbow extension, tricep long head or lateral?3 answersThe tricep long head is more involved in elbow extension compared to the lateral head.
What are the most effective ways to mitigate lateral displacement in steel buildings?4 answersThe most effective ways to mitigate lateral displacement in steel buildings include the use of shear walls and steel plate shear walls (SPSW). Shear walls, especially those located at the center of the building, perform effectively against lateral loads, reducing displacement at the top of the building by approximately 2.5 times compared to buildings without shear walls. Steel plate shear walls, in particular, are lighter and thinner, enhancing the architectural space and rigidity of the structures. Additionally, the use of concrete filled steel tubes (CFT) columns as vertical boundary elements of steel shear walls has been found to improve the seismic behavior of steel structures, providing suitable stiffness, resistance, and ductility. These findings suggest that incorporating shear walls, especially steel plate shear walls and CFT columns, can effectively mitigate lateral displacement in steel buildings.
How do lateral influences between animals affect their behavior?3 answersLateral influences between animals can affect their behavior in various ways. It has been observed that behavioral lateralization, the preferential use of one side of the body or bilateral organs, is a widespread characteristic among vertebrates. This includes motor and sensory lateralization displayed by bony fishes, amphibians, squamates, birds, and mammals. Lateralization can occur in different behavioral contexts such as searching for food, prey, auditory vigilance, antipredator vigilance, manipulation of objects, tool use, environmental exploration, and social and reproductive contexts. The adaptive advantage of lateralization can vary between species. In some cases, lateralized individuals can perform two tasks controlled by opposite brain hemispheres simultaneously, while in others, lateralization benefits the population as a whole by enhancing social behavior when all members of the group are similarly lateralized. Overall, lateral influences play a significant role in shaping animal behavior and can have important implications for their survival and social interactions.
How lateral movement attacks are represented in provenance data?5 answersLateral movement attacks are represented in provenance data through various methods. One approach involves monitoring system level activities using software agents deployed on operating systems and constructing an execution graph based on these activities. Another approach uses a Continuous-Temporal Lateral Movement Detection framework, which represents remote and local authentication events as a Path Connection Graph and a Bipartite Graph respectively. Normal and malicious lateral movement paths are then classified using graph embedding methods. Additionally, visualization of provenance data can be used to display the relationship between entities derived from a user-selected entity and entities used to derive the user-selected entity. Another method involves constructing a host communication graph and using features aggregation learning to aggregate new composite features for malicious host classification. These different approaches provide insights into the detection and representation of lateral movement attacks in provenance data.