• Home
  • Attack
  • Detect
  • Predict
  • Dataset
  • Contact Us
        • T1-24–01–S–N–CL
        • T2-24–01–S–N–CL
        • T3-24–01–S–N–CL
        • T4-24–01–S–E–M
        • T5-24–01–S–E–LM
        • T6-24–01–S–E–FH
        • T7-24–01–M–NE–CLM
        • T8-24–01–M–NE–CFHL
        • T9-24–01–M–NE–CLM
        • T1-24–02–S–N–CIKM
        • T2-24–02–S–N–CL
        • T3-24–02–S–N–CL
        • T4-24-02-S-E-M
        • T5-24-02-S-E-DL
        • T6-24-02-S-E-DEGN
        • T7-24-02-M-NE-CDEGLN
        • T8-24-02-M-NE-CDL
        • T9-24-02-M-NE-CLH
        • T1-25–01–S–N–CD
        • T2-25–01–S–N–CL
        • T3-25–01–S–N–CD
        • T4-25-01-S-E-FH
        • T5-25-01-S-E-CL
        • T6-25-01-S-E-CL
        • T7-25-01-M-NE-CDN
        • T8-25-01-M-NE-CLFH
        • T9-25-01-M-NE-CDFH
      • Model Description
      • Explainable AI
  • Predict
  • Figure Key goals of XAI in malicious network detection: transparency, interpretability, trust, and accountability.


  • A Cyber Hybrid Attack refers to an advanced threat in which adversaries combine multiple, heterogeneous attack techniques concurrently or sequentially rather than relying on a single vector. By orchestrating social engineering, malware deployment, vulnerability exploitation, lateral movement, data manipulation, encrypted C2 channels, and denial-of-service operations in a coordinated chain, attackers exploit detection gaps across disparate security layers. Because each stage often appears independent, single-event analysis fails to expose the full intrusion, enabling APT groups or highly skilled actors to operate stealthily over extended periods. This multifaceted structure significantly expands the impact and complexity of the attack, making comprehensive detection, attribution, and response far more challenging.

    Cyber threat prediction can begin by identifying an initial attack indicator and generating k likely subsequent tactics or techniques (TTPs), then recursively predicting the next possible steps for each of those outcomes. This predictive structure focuses on modeling transition patterns within the entire attack sequence, rather than analyzing isolated events. By leveraging historical threat data, TTP transition probabilities, graph-based attack path analysis, and behavioral patterns associated with specific adversary groups, the model can estimate the most probable next-stage actions. This enables organizations to move beyond simple alert handling and instead anticipate future attack flows, potential intrusion paths, and adversary intent, allowing for more proactive and strategic defense preparation.


  • Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.