2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS) 2016
DOI: 10.1109/acosis.2016.7843932
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…The attack can also use more than one attack vectors simultaneously. [1][2][3][4][5][6][7][8][9][10] Another weakness that help attackers is the fact that 100% secure systems does not exist. Even well designed and protected systems and networks have their weak spots [8].…”
Section: Apt Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…The attack can also use more than one attack vectors simultaneously. [1][2][3][4][5][6][7][8][9][10] Another weakness that help attackers is the fact that 100% secure systems does not exist. Even well designed and protected systems and networks have their weak spots [8].…”
Section: Apt Attackmentioning
confidence: 99%
“…The term "kill chain" originates from military concept and it was adopted to information security as "Cyber Kill Chain" by Lockheed Martin. This commonly used kill chain describes seven stages for an attack, which are i) Reconnaissance, ii) Weaponization, iii) Delivery, iv) Exploitation, v) Installation, vi) Command and Control and vii) Actions on Objective [1,2,7]. Few other similar kill chain definitions to mention are: i) LogRhythm, ii) Lancaster, iii) SDAPT and iv) BSI -model [7].…”
Section: Kill Chainmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, the APT (Advanced Persistent Threat) [2], attack is targeting IT network and allows an unauthorized person to gain access to a corporate LAN and stay there undetected for a long period. The intention of the APT attack is mainly to steal corporate information rather than to cause physical damage to equipment.…”
Section: Introductionmentioning
confidence: 99%