Research Article

GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things

Table 7

Techniques corresponding to each tactic and commands mapped to these techniques in our datasets.

TacticTechniqueCommand

Defense evasionDisabling security tools
Clearing command history
File deletion
File and directory permissions modification
service iptables stop
history -c
rm
chmod

DiscoveryProcess discovery
File and directory discovery
ps
cd; ls; dir

Lateral movementRemote File copytftp; wget; curl; ftpget

ExecutionExploitation for client Executionsh;./mips;./zuki;./nig

ImpactNetwork denial of serviceultimate

CollectionData from local systemecho; more; cat