Security and Privacy for Big Data, Cloud Computing and Applications 2019
DOI: 10.1049/pbpc028e_ch7
|View full text |Cite
|
Sign up to set email alerts
|

A layered security architecture based on cyber kill chain against advanced persistent threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…vulnerability exploitation, malicious code execution, software modification, and eventually system destruction or data theft. In the network security area, the layered security model is defined as the concept of securing a computer network through a sequence of defensive mechanisms, so that if one fails, another is already in place to prevent an attack [6][9] [34]. The basic assumption on this model is that no single mechanism can successfully safeguard the network from attacks due to the great variety of attacks.…”
Section: Common Stages Of Ikc Models Used In Apt Attacks (Regarding T...mentioning
confidence: 99%
See 1 more Smart Citation
“…vulnerability exploitation, malicious code execution, software modification, and eventually system destruction or data theft. In the network security area, the layered security model is defined as the concept of securing a computer network through a sequence of defensive mechanisms, so that if one fails, another is already in place to prevent an attack [6][9] [34]. The basic assumption on this model is that no single mechanism can successfully safeguard the network from attacks due to the great variety of attacks.…”
Section: Common Stages Of Ikc Models Used In Apt Attacks (Regarding T...mentioning
confidence: 99%
“…advanced persistent threats (APTs) [3] [4]. In this type of attack, the attacker, based on a variety of attack tools and techniques, goes through a next-generation threat life cycle to achieve its target, which is called intrusion kill chain (IKC) or cyber kill chain (CKC) [3][5] [6][9] [10]. In the other words, based on a specified IKC model, the attackers use sequencing of attack stages involving various attack steps to infiltrate the target network and obtain their final goals by moving laterally across multiple hosts of the network for exfiltration of sensitive data or sabotage.…”
Section: Introductionmentioning
confidence: 99%