2018 IEEE International Conference on Big Data (Big Data) 2018
DOI: 10.1109/bigdata.2018.8622255
|View full text |Cite
|
Sign up to set email alerts
|

A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…34 It is possible to take advantage of this approach in order to develop interception methods and defensive plans against offensives by attack teams funded by state actors for espionage or sabotage purposes. 35 ATT&CK contains 14 tactics and more than 500 techniques to counter the attacks of these groups. 37 Figure 1 shows which tactics and techniques are designed based on MITER.…”
Section: Discussionmentioning
confidence: 99%
“…34 It is possible to take advantage of this approach in order to develop interception methods and defensive plans against offensives by attack teams funded by state actors for espionage or sabotage purposes. 35 ATT&CK contains 14 tactics and more than 500 techniques to counter the attacks of these groups. 37 Figure 1 shows which tactics and techniques are designed based on MITER.…”
Section: Discussionmentioning
confidence: 99%
“…APTs use multiple attack techniques and tactics that are executed with stealth and are targeted specifically to achieve a defined goal, most often espionage, remaining inside the network for a long time [8] [18]. Attacks are typically carried out via communication channels such as email or instant messaging by masquerading as legitimate and trustworthy entities [19].…”
Section: A Apt Attack Methodologymentioning
confidence: 99%
“…APTs often rely on social engineering attack vectors namely spear-phishing and water-holing [7] [8]. In this respect, the human factor is a critical element in an organizational computer system, as it is a vulnerable link; the only factor that exercises initiative, and the factor that transcends all the other elements of the entire system [9].…”
Section: Introductionmentioning
confidence: 99%
“…Since the data collected from these sources exist in natural language or a similar form, not in a standardized form, a method of extracting the context of information from this type of data is required. In [29][30][31][32][33], they propose methods to collect and analyze CTI data using natural language processing and semantic analysis techniques.…”
Section: State Of the Artmentioning
confidence: 99%