• 书信范文
  • 文秘范文
  • 党团范文
  • 工作总结
  • 工作计划
  • 工作报告
  • 心得体会
  • 合同范文
  • 节日大全
  • 自我鉴定
  • 演讲稿
  • 汉字意思
  • 其他范文
  • 当前位置: 天一资源网 > Resilience 正文

    Impact,Analysis,of,Resilience,Against,Malicious,Code,Attacks,via,Emails

    时间:2023-01-27 15:15:04 来源:天一资源网 本文已影响 天一资源网手机站

    Chulwon Lee and Kyungho Lee

    1Department of Information Security,Korea University,Seoul,02841,Korea

    2Institute of Cyber Security&Privacy,Korea University,Seoul,02841,Korea

    Abstract: The damage caused by malicious software is increasing owing to the COVID-19 pandemic, such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infrastructures and spear-phishing attacks on business or research institutes.Recently, several studies have been conducted to prevent further phishing emails in the workplace because malware attacks employ emails as the primary means of penetration.However,according to the latest research,there appears to be a limitation in blocking email spoofing through advanced blocking systems such as spam email filtering solutions and advanced persistent threat systems.Therefore, experts believe that it is more critical to restore services immediately through resilience than the advanced prevention program in the event of damage caused by malicious software.In accordance with this trend, we conducted a survey among 100 employees engaging in information security regarding the effective factors for countering malware attacks through email.Furthermore, we confirmed that resilience, backup,and restoration were effective factors in responding to phishing emails.In contrast,practical exercise and attack visualization were recognized as having little effect on malware attacks.In conclusion,our study reminds business and supervisory institutions to carefully examine their regular voluntary exercises or mandatory training programs and assists private corporations and public institutions to establish counter-strategies for dealing with malware attacks.

    Keywords:Cyberattack;resilience;malicious code;spear-phishing

    Cyberattacks are on the rise in society, owing to the COVID-19 pandemic, by 150% in the healthcare sector, 230% in the financial sector, and 350% in the phishing website [1].According to Google reports in April 2020,there were 18 million malicious and phishing emails,and more than 240 million daily spam messages pertaining to COVID-19 [2,3].Therefore, the damage caused by these cyberattacks has increased by 600%compared to that prior to the COVID-19 pandemic[4].Moreover,ransomware damage from these cyberattacks occurs in all areas of society, including healthcare,education,and finance.PCs or networks infected by malicious codes that paralyzed files in computers or network systems in organizations in the past can be easily restored by treating them.However,forprofit ransomware has recently tended to not only disable the social infrastructure and make corporate or personal data out of control for good but also expand its reach into the individual,business,and social infrastructure at large[5].The malicious code circulates through email attachments,malicious links,and infected storage devices.In particular,the TA505 hacking group uses spear-phishing emails containing attachments with malicious code to extract information from targeted organizations or individuals [6].According to the Symantec Internet Security Threat Report, 2019, 60% of cyber criminals used spear-phishing as the most common type of targeted attack [7].Spear-phishing, an attempt to extort sensitive information from targeted public organizations or ask for money through ransomware, is an increasingly common type of cyberattack, the case in which hackers took down the operating technology system of the Colonial Pipeline Co.in the US and hacked confidential information from the Korea Aerospace Industries(KAI)in Korea.Therefore,detecting and blocking malicious codes in advance, which are increasingly threatening, has technical limitations.Experts are now suggesting a change in thinking that augments fast resilience from malicious code attacks rather than blocking malware attacks.Minimizing downtime and quickly restoring to the normal state are considered effective measures to respond to malware attacks through emails in the event of cyberattacks,including spear phishing attacks.

    Our study contributes to finding factors influencing the effectiveness of malicious code through email in response to presentation, investigation and analysis of response modeling based on the methods of recent studies regarding malware attacks under the COVID-19 pandemic.

    A variety of studies have been c onducted to effectively respond to malicious codes via email,such as spam prevention solution, advanced persistent threat (APT)prevention, reconsideration with information security education,counter security exercise against cyberattacks,reinforcing cyber resilience, and cyberattack visualization.Luo et al.[5] suggested a framework consisting of four stages to prevent malicious code via email.First,formulating the reaction policies and establishing a procedure to implement them.Second,reinforcing the control of banning the downloads of suspicious files through the Internet and prohibiting the reading of unidentified emails.Third, building an operating system to manage patches or updates to protect computers.Finally, improving awareness that if employees read a malicious email,it could seriously impact their customers and organizations.Alexander [8] emphasized the visualization of real-time cyberattacks to effectively respond to them as air traffic control watched the planes entering the runway in real time because it was difficult to react to invisible attacks.Lee et al.[9] developed a method to estimate the effectiveness of security event visualization to overcome the limitations of massive data analysis related to security incidents under the continuous occurrence of serious security accidents.There were several evaluation factors that include the predictability of security incidents, contents of delivery, effectiveness, immediacy,efficiency,clarity,and diversity.Furthermore,there was a difference in perspectives on the evaluation factors of visualization among managers, operators, and security consultants: managers recognized the content of delivery as the most important factor,operators consider clarity and immediacy,and security consultants recognize work efficiency.A study on the visualization of intelligence for cyber threats was in progress to collect and analyze information on cyber security threats and react to them effectively [10].Bürkner [11] required practical exercises and simulations, such as fire drills,against cyberattacks to respond to security incidents.Resilience has been widely used in a variety of fields such as ecology,individual and organizational psychology,supply chain management,strategic management, and safety engineering.Resilience refers to the ability to bounce back to a steady state after disruption in these fields [12-18].Other definitions of resilience are as follows: Gallopín[19] regards system resilience as the ability to adapt to failures and security incidents, mitigate their impact, and cope with the outcomes of deformation caused by them using every available resource;Smith[20]considered cyber resilience in the context of a complicated system composed of physical,informational,cognitive,and social spheres;Kott et al.[21]considered the cyber resilience domain to consist of sensing,software,and hardware.Frenz et al.[22]proposed a plan for backup and restoration impact factors in a ransomware attack.Tab.1 shows the key ideas of the authors.

    Table 1: Comparison of related works

    3.1 Research Model

    This research model highlights the importance of resilience in responding to malicious code using email.In particular,attack visualization,practical exercise,and backup and restoration are required to improve resilience.Fig.1 demonstrates the research model.

    Figure 1:Research model

    Effective factors for countering malicious codes include installing software such as antiviruses or blocking systems such as IPS,which has been considered important in the past,information protection education for employees, and sanctions.Other than disciplinary actions, all factors are considered effective measures that can be taken in advance before a hacking attack occurs.This proactive control is a control factor, as opposed to resilience, which weighs the recovery ability after hacking.Also,disciplinary actions can be classified as a control element to prevent recurrence after hacking incidents,unlike resilience, which aims to normalize services under hacking attacks.Three factors affecting resilience were selected because of their importance in recent studies.

    The blocking of malicious code attacks through email in advance seems to have reached its limit.Therefore,rather than responding to the goal of blocking all attacks,it can be said that an approach to how quickly an attack can be returned to normal when it occurs is important.As Fig.1 shows,the research model indicates that resilience is of paramount importance to effectively respond to malicious code attacks through email.Also, there are three factors selected on the basis of recent studies as factors significantly affecting resilience.Attack visualization points out that when a cyberattack occurs,visualizing which attack is occurring from which direction impacts resilience.Practical exercise considers that it is important for resilience in the event of an actual cyberattack to implement practical response training before a cyberattack occurs.In Backup and restore, a backup system for quick recovery in the case of failure to defend against an initial attack is considered an important factor in resilience.Tab.2 lists detailed definitions of the terms used in the model.

    Table 2: Definitions of terms

    3.1.1 Necessity of Cyber System Resilience

    The extent of damage from cyber threats is becoming large-scale and wide-ranging owing to a volatile cyber environment caused by COVID-19, as well as the improvement in internet speed and the expansion of connected devices such as IoT [2].The Interpol Secretary General warned that cyber criminals were developing a new attack at an alarming rate using COVID-19 to exploit the fear and uncertainty caused by an unstable society and grim economic conditions[2].There are growing concerns about the traditional approach to strengthening systems owing to the unpredictability and uncertainty caused by the swift evolution of cyber threats to systems.Thus,resilience enables systems to adapt to cyberattacks.In other words, it is important to have the ability to restore or regenerate degraded systems in the aftermath of cyberattacks[21].Therefore,we hypothesize the following:

    H1: Improving the resilience of cyber systems will have a positive effect on responding to malicious code.

    3.1.2 Visualizaion of Malicious Code Email Attack

    An increase in cyberattacks hampers security control by augmenting the events of security systems,such as firewalls,IPS,and antivirus software.Also,the analysis of spot cyberattacks from massive trade data is also becoming complicated owing to the increased complexity between the local system and cloud systems because of the growing use of cloud systems.Visualizing malicious code attacks is an important factor for determining them at a glance because restrictions hinder us from implementing security control practically monitoring all of them in the massive amount of log data one by one[9].Therefore,we hypothesize the following:

    H2:Visualizing malicious code attacks will have a positive effect on improving resilience.

    3.1.3 Practical Excercise

    Patriciu et al.[23]stated that cybersecurity exercises were very effective in protecting information.They provided practical ways to implement cyber exercises and guidelines for evaluating the indicators of the effectiveness of exercises.Kick [24] focused on having a sense of reality in scenario-based training that mixed actual events during cyber exercises.Several organizations are executing exercises for employees to respond to malicious code using email,expecting their performance.Chatchalermpun et al.[25]conducted an empirical study comparing the exercise results of phishing emails for 21,000 employees in a financial firm in Thailand.Therefore,we hypothesize the following:

    H3: Practical exercises responding to malicious code using email will have a positive effect on improving resilience.

    3.1.4 Backup and Restore

    Frenz et al.[22]stated that the plan for backup and restoration was important for reacting to a ransomware attack.Richardson and North[26]highlighted the importance of exercise and backup in preventing ransomware attacks.Therefore,we hypothesize the following:

    H4:Backup and restoration will have a positive effect on improving resilience.

    3.2 Research Methods

    3.2.1 Study Design and Data Collection

    Structural equation modeling (SEM)was used as a multivariate method to prove the causal relationships between factors.Also, we used analysis of moment structures (AMOS)as an SEM tool because of its convenient graphical user interface(GUI)and data compatibility with SPSS and EXCEL.Also, SEM has several advantages: controlling measurement errors, convenience of using mediating variables,and enabling statistical model evaluation[27].Therefore,this study was conducted using SEM(see Fig.2).

    Figure 2:Process of research

    Online surveys were conducted with employees of the security department in Korea using Google Forms to collect data for model verification.Among them,100 replied to the survey,Tab.3 shows the demographic information of the respondents.

    Table 3: Demographic information of respondents

    Table 3:Continued

    3.2.2 Constructs and Measurement

    We used six items adopted by [9] to measure how effectively organizations could respond to malicious code attacks using emails.Six items adopted by [28] were used to measure the resilience of systems that could run properly under malicious code attacks via emails.Six items adopted by[9]were used to measure visualization of cyberattack vectors, such as its starting or destination point,and the types of attacks during malicious code attacks via emails.Six items adopted by[23,24]were used to measure the effectiveness of cyberattack response exercises against security incidents.Six items adopted by[25]were used to measure resilience to determine how effective restoration from backup data could occur during damage caused by malicious code attacks via emails(Tab.4 lists the survey scale items).

    Table 4: Survey scale items

    Table 4:Continued

    4.1 Validity and Reliability

    First, we tested the unidimensionality of the measurements using confirmatory factor analysis(CFA).A valuation basis for model fit was used(see Tab.5).

    To obtain the optimal value of reliability,we deleted problematic items using the squared multiple correlation (SMC).A repeated process was used to obtain the desired result, in which the reference value was 0.4,which was less than that of SMC.Thus,we obtained the results shown in Tab.6.The final variables were believed to satisfy reliability requirements because all constructs and measuring indicators(CMIN/DF,P,RMR,GFI,AGFI,CFI,NFI,RMESA)are fulfilled on the basis of Tab.5.

    Table 5: Reference value of Model-fit

    Table 6: Results of confirmatory factor analysis(CFA)

    Second,our measurement model was analyzed based on the aforementioned CFA.After optimizing the adequacy of the survey questions(partly by deleting measured variables)based on the SMC values,our data yielded the following results(see Tab.7).

    Table 7: Results of the measurement model’s analysis

    As shown in Tab.7,critical ratio(CR)indicates the t value,and the regression weight is significant when the value is greater than±1.96.Notably,all CR values are greater than 1.96.SMC indicates the ability to demonstrate the observed variables for latent variables.Therefore,SMC can tolerate variables based on a reference value of 0.4.As shown in Tab.5,the standards for model fit are as follows:P is greater than 0.05;RMR is less than 0.05(as well as less than 1);GFI,AGFI,CFI,NFI,and IFI are greater than 0.9;RMSEA is less than 0.08(as well as less than 1).The results of the model analysis are acceptable because all values satisfy the reference values.

    Third,a reliability analysis was performed using two tests:convergent and discriminant validity.Construct reliability was used to assess convergent validity[31],and average variance extracted(AVE)was used to assess discriminant validity[32].Eqs.(1)and(2)was used to determine construct reliability and AVE.

    Tab.8 presents the analysis results.

    Table 8: Validation of the measurement model

    The results showed that convergent validity was demonstrated with construct reliability values(0.896 to 0.989 for all constructs greater than 0.7).Moreover, discriminant validity is demonstrated because the AVEs(0.680 to 0.969)of all variables are greater than the largest correlation coefficient(resilience:0.815)of the square root(0.664)[32].

    4.2 Result of Analysis

    Malware attacks via emails have grown in number in the following ways:ransomware cyberattacks on organizations and social infrastructures,and information capture through spear-phishing attacks.According to several experts,resilience has emerged owing to the limitations of advanced prevention systems in the face of a variety of efforts to tackle the damages caused by malicious email attacks.Thus,we established a new model to demonstrate the relationship among three factors:attack visualization,practical exercise, and backup and restore, which affected resilience against malware attacks via email.As Tab.9 shows,the estimates from SEM were within tolerable levels for the proposed model,such that CMIN=38.565,CMIN/DF=0.838,P=0.774,GFI=0.939,AGFI=0.897,CFI=1.000,RMR=0.065, RMSEA=0.000, NFI=0.961, and IFI=1.008.Therefore, the model fit was appropriate for comparison with reference values(CMIN/DF<2,P>0.05,GFI ≥0.9,AGFI ≥0.85,CFI≥0.9,NFI ≥0.9,RMR ≤0.1,and RMSEA ≤0.1).

    Table 9: Results of the model

    The test results of the proposed hypotheses H1 and H4 were supported within the 95%confidence interval with P<0.05, and C.R.>± 1.96.Thus, backup and restoration has a positive effect on improving resilience, which positively affects responses against malicious code attacks via emails.However, the proposed hypotheses H2 and H3 are not supported, with P>0.05 and C.R.<± 1.96.Thus,attack visualizaton and practical exercise did not influence resilience(see Fig.3).

    Figure 3: Results of the model, All path coefficients are standardized estimates corresponding to P <0.05,and CR >±1.96.Note that the CR values are within parentheses.Grayed-out arrows indicate that the hypotheses are not supported

    Our study investigated the effectiveness of resilience,attack visualization,practical exercise,and backup and restoration, which recently became important in response to malicious code emails.Because only the necessity of each factor was mentioned in the previous study,we newly investigated how each factor interacted with the effectiveness of the response against malicious codes through resilience.To this end,we used a confirmatory research method using SEM.The results showed that resilience,backup and restoration were effective in responding to malicious code email;however,attack visualization and practical exercise had no meaningful effect.Attack visualization did not have a considerable effect because the attack visualization solutions currently used by companies did not show the attack situation properly.In other words, the current technology for attack visualization did not provide a function that was beneficial to security practitioners.Moreover, in the case of practical exercise, employees became insensitive to training due to frequent exercise.Therefore, our study showed that attack visualization technology required to be improved effectively to assist security practitioners in responding,and the email response exercise required to be completely reformed.

    5.1 Research Contributions

    As malicious code email attacks have become more intelligent and expanding, experts continue to argue that resilience is required in addition to the existing defense system, which is verified by our research.Meanwhile, companies in Korea are also conducting regular email mock training to block malicious code emails, and various policies are in place, such as mandatory submission of response training results to supervisory authorities once a year;however,the current method required to be changed.Furthermore,our study show that resilience is important for effectively responding to malicious code emails, which requires backup.Therefore, it is meaningful to provide a rationale for companies to build a more robust backup system.In addition, it is necessary to review policies for offline backup and real-time backup in preparation for ransomware.

    5.2 Limitations and Future Research

    This study had several limitations.First, it was based on a subjective evaluation of employees performing information protection work in Korea.Therefore,different countries might have different results depending on the region.

    Second, because this study was modeled mainly based on resilience, which had been frequently mentioned recently in the field of information protection,all factors that were effective in responding to malicious code might not have been reviewed.

    Third,the effects of attack visualization and practical exercise were found to be insignificant in this study.Therefore,the subject of future research might be regarding the factors that increased the effectiveness of attack visualization and practical exercise.

    Malicious code and distributors have become increasingly intelligent, and they rapidly take advantage of recent social phenomena.Therefore,when a new technology appears or a change in the social environment appears in the future, the method of dealing with malicious code might change;thus,new studies reflecting such trends must be continued in the future.

    Owing to the impact of COVID-19, non-face-to-face activities have increased, due to which malicious code attacks such as ransomware and spear-phishing have grown in number, along with advancements in their technology.Various technical control devices such as the existing spam mail blocking solution,APT blocking system,and email isolation solution are being installed and running to block malicious code email.However,we are facing a situation that makes it incapable to completely block the emails using these technical control measures,and experts are calling for a paradigm change regarding resilience.Therefore,we developed a malware response model that fits this new paradigm,collected data from 100 information protection experts in Korea using a Google survey,and tested our model through SEM to ensure that resilience and backup were effective in responding to malicious code emails.Therefore,it is expected that our research will be of remarkable interest for establishing a strategy to deal with malicious code attacks.

    Acknowledgement:The authors would like to thank Editage (https://www.editage.co.kr)for their English language editing.

    Funding Statement:This study was supported by a grant from the Korean Health Technology RD Project,Ministry of Health and Welfare,Republic of Korea(HI19C0866).

    Conflicts of Interest: Theauthors declare that they have no conflicts of interest to report regarding this study.

    相关关键词: Resilience
    相关热词搜索: Resilience analysis Impact

    • 范文大全
    • 教案下载
    • 优秀作文
    • 励志
    • 课件
    • 散文
    • 名人名言