I need to know the current/existing techniques used in order to get the patterns of attacks. My main concern is for cloud wise attacks if that makes any differences. To be later used in developing attacks' mitigation techniques and systems.
I know that different attacks would have their own-unique- pattern, unless for some similarities which could be common among attacks of same category-this is based on the classification and/or grouping of attacks based on certain criteria.
But I'm looking for the way or approach to get that patterns.
Robin Gandhi but these are the patterns of the attacks. However,I have visited the site before. But I'm looking for the analysis processes/methods to get these patterns out of the attacks and the attackers.
Buddy your question was not narrowed down there are zillions of types of attacks like some attacks are on the architecture, some are external. There are different intents, motivations and different vulnerabilities work on them by exploiting different parts of your network/hardware. Which part are you discussing here?
We have developed an approach to automatically generate attack scenarios to Test security tools (mainly the IDS). Despite the approach considers generic attacks, it may help. The following papers explain the approach: