2016
DOI: 10.1007/s11227-016-1850-4
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 95 publications
(38 citation statements)
references
References 63 publications
0
38
0
Order By: Relevance
“…Mirco Marchetti et al [14] detected hosts with suspicious behavior by analyzing a large number of host features. Yong Shi et al [10] used principal component analysis, k-means clustering, and outlier detection based on median absolute bias.…”
Section: Existing Apt Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Mirco Marchetti et al [14] detected hosts with suspicious behavior by analyzing a large number of host features. Yong Shi et al [10] used principal component analysis, k-means clustering, and outlier detection based on median absolute bias.…”
Section: Existing Apt Detection Methodsmentioning
confidence: 99%
“…Meicong Li et al divide an APT attack into four stages [13]: Preparation, Access, Resident, and Harvest. In [14], on the prediction and analyses of APT attacks, Saurabh Singh et al express their belief that attacks can form an attack cycle composed of Reconnaissance, Breach, Infiltration, Exfiltration, and Stealth persistence.…”
Section: Attacking Models Of Aptmentioning
confidence: 99%
“…In this way, it is foreseen that vehicular network endures an indistinguishable security issue from cloud computing. The primary security difficulties of the vehicular network include [23][24][25][26][27][28][29]:…”
Section: Privacy and Security Of Vehicular Networkmentioning
confidence: 99%
“…In this regard, the Advanced Persistent Threats (APT) represent the most critical hazard in recent years. These are sophisticated attacks perpetrated against a specific organization, where the attacker has considerable experience and resources to penetrate the victim's network, using a multitude of vulnerabilities and attack vectors [3]. They use stealthy techniques to go undetected for a prolonged period of time, from the initial intrusion to the subsequent propagation movements (a.k.a.…”
Section: Introductionmentioning
confidence: 99%