2014
DOI: 10.14355/ijcsa.2014.0302.01
|View full text |Cite
|
Sign up to set email alerts
|

A Theoretical Model for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine (FAST-VM)

Abstract: Intrusion detection systems have undergone numerous years of study and yet a great deal of problems remain; primarily a high percentage of false alarms and abysmal detection rates. A new type of threat has emerged that of Advanced Persistent Threat. This type of attack is known for being sophisticated and slow moving over a long period of time and is found in networked systems. Such threats may be detected by evaluation of large numbers of state variables describing complex system operation and state transitio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…APT attacks are highly targeted attacks with clearly defined goals, which typically target governments or businesses, due to their substantial intellectual property value [12] [13]. While APT threats have drawn increased attention from the industrial security community, a comprehensive and clear understanding of the APT research problem is lacking [12].…”
Section: Apt Perspectivesmentioning
confidence: 99%
See 2 more Smart Citations
“…APT attacks are highly targeted attacks with clearly defined goals, which typically target governments or businesses, due to their substantial intellectual property value [12] [13]. While APT threats have drawn increased attention from the industrial security community, a comprehensive and clear understanding of the APT research problem is lacking [12].…”
Section: Apt Perspectivesmentioning
confidence: 99%
“…APTs are not usually deployed to bring down a business, but to stay embedded within its systems and extract information at a slow and undetected pace [15]. As highly advanced networked entities, typical of organized groups, they conduct hostile cyber-attacks against connected computers; if on a local network or the internet [13]. Using stealth techniques, they aim to continuously monitor, admin-istrate, and steal specific target data in the long term, while staying undetected [16].…”
Section: Apt Perspectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…Security log analysis using Big data has been proposed by Jeon et al (2016). Here they employed a finite angular state transition velocity machine, and its vector based analytic algebra, to detect APT inside the network (Vert et al, 2014). Network traffic and client data analysis, form multiple network locations, using both signature and anomaly detection methods derived from the intelligent data analysis field, has been proposed by De Vries et al (2012).…”
Section: Research On Apt Countermeasuresmentioning
confidence: 99%
“…As a highly sophisticated, well-resourced threats aimed primarily towards the government sector (Thakar and Parekh, 2016), the goal of an APT attack is not to just gather a target entity's data, but to accomplish it undetected (Alshamrani et al, 2019). While the majority of cyber-attacks rely on automated scanning and exploitation of known vulnerabilities over large sets of targets (Marchetti et al, 2016), APT attacks are highly targeted attacks, with a clear goal typically targeting governments or business targets with substantial intellectual property value (Chen et al, 2014, Vert et al, 2014. Reports of APT attacks targeting high-profile organizations, ranging from large-scale enterprises and financial institutions to government sectors continue to occur unabated (Yang et al, 2018).…”
Section: Introductionmentioning
confidence: 99%