<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Implementation of Behavioral Indicators in Threat Detection and User Behavior Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yegor Anashkin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marina Zhukova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Reshetnev Siberian State University of Science and Technology</institution>
          ,
          <addr-line>31 Krasnoyarskii rabochii prospekt, Krasnoyarsk, 660037</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>17</fpage>
      <lpage>24</lpage>
      <abstract>
        <p>This paper considers the evolutionary path of indicator development in the tasks of monitoring and threat detection. The work aims to form a unified descriptive structure for behavioral indicators. The resulting description standard is designed to create an open database of behavior indicators. The base of behavior indicators shall be the basis for the user action profiling system that's developing by the authors. Prospects of application of the obtained results are also seen by the authors in the field of Threat Hunting, Threat Intelligence, and automation of correlation rules for SIEM systems. In addition, the possibilities, benefits, and methods of implementation of behavior indicators in the process of user actions profiling are considered.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Indicators</kwd>
        <kwd>IoC</kwd>
        <kwd>IoA</kwd>
        <kwd>IoB</kwd>
        <kwd>Threat Hunting</kwd>
        <kwd>UBA</kwd>
        <kwd>user behavior analytics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>threats or attempts to implement threats. When classifying indicators in information security, three types
of indicators can be distinguished:
 indicator of compromise (IoC)
 indicator of attack (IoA)
 indicator of behavior (IoB)</p>
    </sec>
    <sec id="sec-2">
      <title>2. Indicators of Compromise</title>
      <p>
        Today, indicators of compromise (IoCs) are the most widely used. An Indicator of Compromise
(IoC) is an object observed on a network or an endpoint, that is highly likely to indicate unauthorized
access to the system (that is, its compromise) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. These indicators are used to detect malicious activity
at an early stage, as well as to prevent known threats. Popular types of IoC are IP addresses, DNS
names, and file hashes.
      </p>
      <p>
        However, IoCs have not become a complete and sufficient solution for detecting all attempts to
implement threats. The major shortcomings of compromise indicators are highlighted [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
 Professional attackers who conduct targeted attacks either develop new tools or modify known
hacker tool signatures, such as mimikatz. Due to their uniqueness, such tools are not detected by
indicators.
 Possibility of flooding databases with indicator noise. Attackers send a lot of false indicators,
due to which professionals need to filter indicators. It also leads to a decrease in the informativeness
of the indicators. It also leads to a decrease in confidence in the indicators.
 Professional attackers use the «fileless» malware technique [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In this technique, the
malicious file is not delivered to the victim's device but is built on the end-device by downloading
the malicious code through standard OS features, such as PowerShell.
 Generally, IoCs are used in reactive mode. It means a successful attack is discovered when IoCs
are found out in forensic artifacts. Thus, IoCs are instruments to identify compromising, but not to
provide proactive protection.
      </p>
      <p>In summary, the use of IoCs can help detect attacks in which attackers use already known objects
(files, DNS, IP, etc.). However, IoCs remain powerless against modern targeted attacks. This led to the
emergence and application of a new type of indicators – Indicator of Attack (IoA) and Indicator of
Behavior (IoB).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Indicators of Attack</title>
      <p>
        An Indicator of Attack is a rule (chain of actions) containing a description of suspicious behavior in
the system, which may be a sign of a targeted attack [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. To understand the IoA, refer to the Lockheed
Martin Kill Chain Model [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the ATT&amp;CK [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The Kill Chain model clearly shows a clear
breakdown of an attacker's actions into a sequence of stages to achieve a set goal. The MITRE
Knowledge Base is the structured and most comprehensive knowledge base of the tactics, techniques,
and procedures of professional attackers.
      </p>
      <p>Thus, an indicator of an attack can be a separate technique/procedure (for example T1562.002 Impair
Defenses: Disable Windows Event Logging), or a sequence of techniques used within the framework
of related tactics. As an example, consider running the command line (T1059 Windows Command and
Scripting Interpreter) followed by modification of the registry keys responsible for autostart to
persistence into the system (T1547.001 Boot or Logon Autostart Execution: Registry Run Keys /
Startup Folder).</p>
      <p>
        The use of attack indicators (IoAs) to detect attempts to implement cyberthreats is more effective
than IoCs because changing TTPs (Tactics, Techniques, and Procedures) is the most difficult thing for
an attacker to do [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Indicators of Behavior</title>
      <p>
        An Indicator of Behavior is a digital behavior monitored to understand risks within an organization
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A set of behavioral indicators (IoBs) includes a subset of actions from the attack indicators. The
main difference between IoAs and IoBs is:
 IoAs are more related to TTPs (Tactics, Techniques, and Procedures) of professional attackers
(APTs). In turn, IoBs are signs of potentially dangerous behavior.
 IoBs can be used to detect an internal intruder, an insider or a user who disregards established
security policies.
      </p>
      <p>The following are examples of behavioral indicators:
 use of external media
 work on multiple hosts
 remote login
 work with system utilities
 use of RATs (Remote Admin Tools)</p>
      <p>Indicators of behavior, therefore, have a broader scope of coverage. Behavioral indicators are
applicable in the detection of internal intruders, insiders, breaches or non-compliance with established
information security policies, leaks of confidential information, and others.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Integration of indicators</title>
      <p>
        Specialized solutions called the Threat Intelligence Platform are used to integrate IoCs into the threat
detection process [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Threat Intelligence Platform is able to collect the information about possible
threats from different sources (commercial and free, closed and open, public and private) in real-time,
classify it, and perform various operations with it, including uploading it to the information security
tools. A typical diagram of such a solution is shown in Figure 1.
      </p>
      <p>
        In turn, the attack indicators and behavior indicators currently come as paid rule sets when you
purchase the product [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Open databases, as in the case of IoCs, are not developed. In addition, full
implementation of IoBs requires specific tools for profiling user actions. A user profile should be built,
including the user's IoBs, and each user action should be recorded and compared with the database of
IoBs. Therefore, if IoBs and IoAs are integrated, the diagram shown in Figure 1 will change to look
like Figure 2.
      </p>
      <p>
        Due to the lack of open IoBs databases, a general structure for describing behavioral indicators is
being developed as part of the work in order to create and populate the IoBs database. In the future, it
is planned to use this database of indicators in our own system for profiling user actions, which is being
developed [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>An example XML description of a behavior indicator is given in Listing 1.
&lt;IOB&gt;
&lt;Id&gt;000001&lt;/Id&gt;
&lt;Name&gt; Using the Windows command line &lt;/Name&gt;
&lt;Description&gt;Command line usage may indicate an attempt to execute a system command to
run scripts, change system configuration, retrieve system information, etc. Not all users need
to interact with the command line when performing their work tasks.&lt;/Description&gt;
&lt;Priority&gt;Medium&lt;/Priority&gt;
&lt;Category&gt;Policy Violation, Improper Use&lt;/Category&gt;
&lt;MITRE_TACT&gt;Execution&lt;/MITRE_TACT&gt;
&lt;MITRE_TECH&gt;T1059&lt;/MITRE_TECH&gt;
&lt;Standalone_IOA&gt;true&lt;/Standalone_IOA&gt;
&lt;BehaviorOn&gt;Windows&lt;/BehaviorOn&gt;
&lt;Detection&gt;
&lt;Detector id="1"&gt;
&lt;LogSourceName&gt;Windows Security Log&lt;/LogSourceName&gt;
&lt;EventID&gt;4688&lt;/EventID&gt;
&lt;Parameter&gt;NewProcessName&lt;/Parameter&gt;
&lt;Condition&gt;Contains&lt;/Condition&gt;
&lt;Value type="string"&gt;</p>
      <p>Windows\System32\cmd.exe
&lt;/Value&gt;
&lt;/Detector&gt;
&lt;/Detection&gt;
&lt;/IOB&gt;</p>
      <sec id="sec-5-1">
        <title>Listing 1: Example description of a behavior indicator</title>
        <p>Semantically, the structure of the IoB description can be divided into two components: a block with
the necessary descriptive characteristics of the indicator and a block with information to detect the
indicator. The description and purpose of the fields are shown in the Table 1.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Description of the IoB fields</title>
      </sec>
      <sec id="sec-5-3">
        <title>Field name Id</title>
      </sec>
      <sec id="sec-5-4">
        <title>Name</title>
      </sec>
      <sec id="sec-5-5">
        <title>Description</title>
      </sec>
      <sec id="sec-5-6">
        <title>Priority</title>
      </sec>
      <sec id="sec-5-7">
        <title>Category</title>
      </sec>
      <sec id="sec-5-8">
        <title>MITRE_TACT</title>
      </sec>
      <sec id="sec-5-9">
        <title>MITRE_TECH</title>
      </sec>
      <sec id="sec-5-10">
        <title>Standalone_IOA</title>
      </sec>
      <sec id="sec-5-11">
        <title>BehaviorOn</title>
      </sec>
      <sec id="sec-5-12">
        <title>Detection</title>
      </sec>
      <sec id="sec-5-13">
        <title>Detector</title>
      </sec>
      <sec id="sec-5-14">
        <title>LogSourceName</title>
      </sec>
      <sec id="sec-5-15">
        <title>EventID</title>
      </sec>
      <sec id="sec-5-16">
        <title>Parameter</title>
      </sec>
      <sec id="sec-5-17">
        <title>Condition</title>
      </sec>
      <sec id="sec-5-18">
        <title>Value</title>
      </sec>
      <sec id="sec-5-19">
        <title>Description</title>
      </sec>
      <sec id="sec-5-20">
        <title>Unique identifier of the behaviour indicator</title>
      </sec>
      <sec id="sec-5-21">
        <title>Name of behaviour indicator</title>
      </sec>
      <sec id="sec-5-22">
        <title>Brief description of behaviour indicator</title>
      </sec>
      <sec id="sec-5-23">
        <title>Priority of behaviour indicator</title>
      </sec>
      <sec id="sec-5-24">
        <title>Category of behaviour indicator</title>
      </sec>
      <sec id="sec-5-25">
        <title>Display of the behaviour indicator in MITRE base tactics</title>
      </sec>
      <sec id="sec-5-26">
        <title>Display of the behaviour indicator in the MITRE base technique</title>
      </sec>
      <sec id="sec-5-27">
        <title>Field shows if the behaviour indicator can be considered as a separate attack indicator</title>
        <p>This field shows where the behavior indicator can be observed: on the</p>
        <sec id="sec-5-27-1">
          <title>Windows host, on a network or on a Linux host.</title>
        </sec>
      </sec>
      <sec id="sec-5-28">
        <title>The field includes detectors that can be used to detect an IoB</title>
      </sec>
      <sec id="sec-5-29">
        <title>The field includes the necessary data to detect IoB: in which source to watch, which field and which value.</title>
      </sec>
      <sec id="sec-5-30">
        <title>Event source name</title>
      </sec>
      <sec id="sec-5-31">
        <title>Identifier of the event in the event source system</title>
      </sec>
      <sec id="sec-5-32">
        <title>Parameter of the event to analyze</title>
      </sec>
      <sec id="sec-5-33">
        <title>Condition that must be met by the parameter</title>
      </sec>
      <sec id="sec-5-34">
        <title>Value for condition</title>
        <p>The resulting behavior indicator description structure includes not only descriptive fields but also
typical event sources, fields, and their values required for indicator detection. This feature allows the
use of the IoBs database to automate the writing of correlation rules of SIEM systems.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Implementing behavioral indicators in</title>
    </sec>
    <sec id="sec-7">
      <title>Behavior Analytics) user behavior analysis (User</title>
      <p>
        User Behavior and Entity Analytics is a class of information security tools for detecting threats to
information systems, based on the analysis of user, device, application, and other behavior [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        In today's User Behavior Analytics/User Behavior and Entity Analytics solutions, the Scoring
method or Scoring models (counting the value, in information security, this is counting the value of the
risk) are mostly found [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ].
      </p>
      <p>This approach is combined with the time decay method. This means that when a user stops taking
actions that add negative points to their risk score, the risk score will gradually decrease, e.g. every 5
minutes by 10 points. Thus, this approach is not sensitive to time-distributed attacks. This approach
also lacks retrospective analysis.</p>
      <p>Behavioral indicators can be used to build both retrospective graphs of potential actions that
preceded the current behavior and predict graphs of future actions. Therefore, their use allows for
decoupling from the time frame. Detection should not depend on the frequency of potentially dangerous
actions but on the sequence of such actions.</p>
      <p>
        Also, the quality of UEBA class solutions is highly dependent on the number of data sources used
to enrich actions with context [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Data enrichment allows finding deeper connections. For example,
if integrated correctly with the helpdesk, UEBA can eliminate false positives related to the execution
of applications by administrators on users' hosts. Thus, the number and quality of sources connected
and processed directly affect the accuracy figure (false positive rate).
      </p>
      <p>Hence, a direct way of improving UEBA class solutions is to work on parsing all sorts of existing
data sources, natural language text processing, etc.</p>
      <p>The authors have chosen a different direction – increasing the number of models used.</p>
      <p>In order to reduce false positives and increase the number of scenarios for the use of user action
profiling, a multi-model approach was previously proposed. The multi-model approach, as originally
conceived, consisted of the following models
 a user behavior model
 a working behavior model
 a security behavior model
 a model of a potential attacker</p>
      <p>Previously, the multi-model approach was based on analyzing the sequence of all user actions.
However, the main purpose of this class of solutions is to detect malicious intent in the user's actions.
To detect malicious intent, behavior indicators and attack indicators are sufficient. Therefore, let us now
consider the transformation of each model with the implementation of the behavior indicators.
6.1.</p>
    </sec>
    <sec id="sec-8">
      <title>The user behavior model</title>
      <p>The user behavior model consists of a set of characteristics of the infrastructure with which the user
interacts (e.g. IP address and work hostname) and a set of behavior indicators. The set of behavior
indicators generated by user action profiling is primarily designed to avoid false positives.</p>
      <p>Let's look at a specific example. Let's take an internal attacker as the subject. It is assumed that the
internal attacker already has initial access to the system as opposed to the external attacker. However,
an internal attacker may use his/her colleague's account to elevate his/her rights or hide his/her actions.
To detect such attempts, let's introduce an appropriate behavior indicator - logging in under someone
else's account. The entered indicator will work based on the work host specified in the user's profile.
When a user logs in to a host they have never logged in to before - the system considers this behavior a
possible indicator of logging in under someone else's account.
generated.
3.
where bij=1 if it is possible to move from stage IoB(i) to stage IoB(j).</p>
      <p>Then, for example, putting L = 3 as the chain length required to trigger an alert, consider a case
study. Introduce a behavior indicator, "use of external media", which corresponds to the Initial Access
tactic of the MITRE matrix. The current chain length is 1. Next, we notice the "launching a program
from removable media" indicator, which correlates with the Execution tactic. From the 'use of external
media' indicator, it is possible to move to the "launching a program from removable media" indicator,
so the chain length becomes 2. The next indicator observed is 'change in registry values associated with
autorun'. This indicator is related to the Persistence tactic. The observed indicator can be associated
with the previous one, the chain length becomes 3. Chain length reaches a threshold value - an alert is</p>
      <p>In addition, with this matrix, it is possible not only to detect current events but also to predict
expected indicators of behavior in the future. An example of such a predictive chain is shown in Figure</p>
      <p>Reflecting on this behavioral indicator, it is possible to conclude that there are scenarios with false
positives. For example, a system administrator or helpdesk employee may log on to users' hosts to
resolve technical problems. Therefore, to avoid false positives, these user roles need to have another
behavioral indicator in their profile - operating on multiple hosts.
6.2.</p>
    </sec>
    <sec id="sec-9">
      <title>The potential attacker model</title>
      <p>The potential attacker model is the most significant in terms of the threat posed. This model is
therefore subject to particularly stringent false positives. A solution to this requirement could potentially
be to set it to trigger only when a specific sequential chain of behavior indicators is detected. The
fixation of behavior indicators relating to different stages of an attack is a tell-tale sign of malicious
behavior on the part of the user. This concept can be represented as an IoB matrix:</p>
    </sec>
    <sec id="sec-10">
      <title>The working behavior model</title>
      <p>The working behavior model aims to reduce false positives associated with specific infrastructure
and corporate policies.</p>
      <p>For example, in some organizations the use of remote administration tools is legitimate, in others, it
is not. Therefore, if the activity is legitimate, appropriate behavioral indicators should be added to the
working model.</p>
      <sec id="sec-10-1">
        <title>Examples of corporate behavioral indicators are:</title>
        <p>(1)
 use of remote administration tools (RAT)
 use of telnet
 use of public file repositories</p>
        <p>
          What is the underlying assumption for the effectiveness of this behavioral indicator approach? Three
popular models related to attacker behavior are considered:
 The Kill Chain model by Lockheed Martin [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]
 MITRE ATT&amp;CK matrix [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]
 DIAMOND model [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]
        </p>
        <p>The Kill Chain model does a good job of showing the sequence of actions in an attacker's actions to
achieve their goals.</p>
        <p>The MITRE database is rich in techniques that are indeed capable of being indicators of malicious
intent, as they are highlighted by analyzing the actions of multiple professional groupings (APTs).</p>
        <p>The Diamond model shows that infrastructure features and capabilities (analogous to techniques)
can identify a specific attacker (attacker attribution).</p>
        <p>Thus, the multi-model approach combines the best practices of the three models for analyzing user
behavior. The potential attacker model is based on the consistency principle of the Kill Chain model.
To cover the behavior of professional attackers, the behavior indicators incorporate MITRE matrix
techniques. The user behavior model adopts the Diamond model's experience of identifying a subject
by infrastructure attributes and user capabilities (behavioral indicators).</p>
        <p>Despite the perceived benefits of using best practices, the disadvantages cannot be overlooked:
1. The listed models (Kill Chain, MITRE, DIAMOND) target external attackers. To fully cover
the sources of cyber threats, models need to be expanded and adapted to also target the internal
attacker. As an example, Initial Access tactics from the MITRE base may be completely redundant
for an internal attacker because the internal user has a priori certain access rights.
2. More relevant and precise points of contact between the behavioral indicators are needed.
Building attack chains (transitions between indicators) on the basis of the attack tactics stage alone
will potentially have errors of the first kind. It means detecting an attack attempt based on potentially
consistent behavioral indicators, which actually come from different sources and are not related to
each other. The presence of false-positive verdicts creates the need for additional manual analysis.</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>7. Conclusions</title>
      <p>The next stage in the development of cyber threat monitoring and detection is the integration of
behavioral indicators and attack indicators into this process. This requires not only the availability of
specific tools but also the emergence of open and accessible indicator databases. To this end, attempts
have been made to develop a descriptive framework of behavioral indicators to further build and
populate the primary indicator base. This database will be used in its own system for profiling user
actions. In addition, it is planned to place the database of indicators in the public domain, which will
allow the community to use this database, for example, for the automated creation of correlation rules
for SIEM systems.</p>
      <p>In order to improve the quality of UEBA class solutions, the idea of implementing behavioral
indicators in the behavior analysis is proposed. The advantage of using behavioral indicators is their
focus on malicious intent. Behavioral indicator sequence analysis is able to detect time-distributed
attacks, unlike the popular Scoring method.</p>
      <p>Taking into account the implementation of behavior indicators and the basic ideas of the Kill Chain,
MITRE, and DIAMOND models, an early multi-model approach to user action profiling has been
redesigned. Further work will focus on developing algorithms for modeling and detecting behavioral
indicators from different log events.</p>
    </sec>
    <sec id="sec-12">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Cyber</given-names>
            <surname>Polygon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Threat</given-names>
            <surname>Hunting</surname>
          </string-name>
          .
          <source>Why might you need it</source>
          ,
          <year>2020</year>
          . URL: https://cyberpolygon.com/materials/threat-hunting
          <article-title>-why-might-you-need-it/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>SANS</surname>
          </string-name>
          ,
          <source>Threat Hunting Survey: The Differing Needs of New and Experienced Hunters</source>
          ,
          <year>2019</year>
          . URL: https://www.sans.org/media/analyst-program/
          <year>2019</year>
          <article-title>-threat-hunting-survey-differingexperienced-hunters-39220</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Encyclopedia by Kaspersky, Indicator of Compromise (IoC)</article-title>
          . URL: https://encyclopedia.kaspersky.com/glossary/indicator-of-compromise-ioc/.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Curry</surname>
          </string-name>
          , Indicators of Behavior: The New Telemetry To Find Advanced Cyber Attackers,
          <year>2019</year>
          . URL: https://www.forbes.com/sites/samcurry/2019/06/27/indicators-of
          <article-title>-behavior-the-newtelemetry-to-find-advanced-cyber-attackers/?sh=2d7920e4193e.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Kaspersky</given-names>
            <surname>Anti Targeted Attack Platform</surname>
          </string-name>
          ,
          <article-title>Using indicators of compromise (IOC) and attack (IOA) for Threat Hunting</article-title>
          . URL: https://support.kaspersky.
          <source>com/KATA/3</source>
          .7/en-US/194907.htm.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Hutchins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.J.</given-names>
            <surname>Cloppert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Amin</surname>
          </string-name>
          .
          <article-title>"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains"</article-title>
          ,
          <source>Lockheed Martin Corporation</source>
          ,
          <year>2010</year>
          . URL: https://www.lockheedmartin.com/content/dam/lockheedmartin/rms/documents/cyber/LM-
          <string-name>
            <surname>White-Paper-Intel-</surname>
          </string-name>
          Driven-Defense.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>MITRE</surname>
            <given-names>ATT</given-names>
          </string-name>
          &amp;
          <article-title>CK®</article-title>
          . URL: https://attack.mitre.org/.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>David J.</given-names>
            <surname>Bianco</surname>
          </string-name>
          .
          <source>The Pyramid of Pain</source>
          ,
          <year>2013</year>
          . URL: https://detectrespond.blogspot.com/
          <year>2013</year>
          /03/the-pyramid
          <article-title>-of-pain</article-title>
          .
          <source>html.</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ross</surname>
          </string-name>
          ,
          <article-title>Indicators of Behavior (IOBs) - With 2020 Vision</article-title>
          , Forcepoint,
          <year>2020</year>
          . URL: https://www.forcepoint.com/blog/x-labs/
          <article-title>indicators-of-behavior-iob.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Forcepoint</surname>
          </string-name>
          .
          <article-title>Dynamic User Protection</article-title>
          . URL: https://www.forcepoint.com/product/dynamic-userprotection.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Yegor</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Anashkin</surname>
            ,
            <given-names>Marina N.</given-names>
          </string-name>
          <string-name>
            <surname>Zhukova</surname>
          </string-name>
          .
          <article-title>"About the System of Profiling User Actions Based on the Behavior Model" IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St</article-title>
          . Petersburg,
          <year>Russia 2021</year>
          . doi:
          <volume>10</volume>
          .1109/ElConRus51938.
          <year>2021</year>
          .
          <volume>9396158</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Microsoft</surname>
            <given-names>Docs</given-names>
          </string-name>
          , Fileless threats,
          <year>2021</year>
          . URL: https://docs.microsoft.com/enus/windows/security/threat-protection/intelligence/fileless-threats.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>Encyclopedia by Kaspersky, UEBA (User and Entity Behavior Analytics)</article-title>
          . URL: https://encyclopedia.kaspersky.com/glossary/ueba/.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Deep Learning in Security - An Empirical Example in User and Entity Behavior Analytics (UEBA), Spark Summit</article-title>
          , Video,
          <year>2017</year>
          . URL: https://databricks.com/session/deeplearning-in
          <article-title>-security-an-empirical-example-in-user-and-entity-behavior-analytics-ueba.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Derek</surname>
            <given-names>Lin</given-names>
          </string-name>
          ,
          <article-title>Leonid Kladko, User Behavior Analytics for Cyber Security</article-title>
          and Its Implementation In Scala, ScalaUA Conference, Video,
          <year>2018</year>
          . URL: https://www.scalaua.com/
          <year>2018</year>
          /03/22/userbehavior-analytics
          <article-title>-for-cyber-security-and-its-implementation-in-scala-derek-lin-leonid-kladko/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Sadowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Litan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bussa</surname>
          </string-name>
          , T. Phillips,
          <article-title>Market Guide for User and Entity Behavior Analytics: analytical report</article-title>
          , Gartner,
          <year>2018</year>
          . URL: https://www.cbronline.com/wpcontent/uploads/dlm_uploads/
          <year>2018</year>
          /07/gartner-market
          <article-title>-guide-for-</article-title>
          <string-name>
            <surname>ueba-</surname>
          </string-name>
          2018
          <source>-analyst-report.pdf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Caltagirone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pendergast</surname>
          </string-name>
          .
          <article-title>The Diamond Model of Intrusion Analysis, Center for Cyber Threat Intelligence</article-title>
          and Threat Research, Hanover,
          <string-name>
            <surname>MD</surname>
          </string-name>
          ,
          <year>2013</year>
          , 61 P. URL: https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Cyberpedia</surname>
          </string-name>
          ,
          <article-title>What is a Threat Intelligence Platform, Palo Alto Networks</article-title>
          . URL: https://www.paloaltonetworks.com/cyberpedia/what-is
          <article-title>-a-threat-intelligence-platform.</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>