2019
DOI: 10.1109/tifs.2018.2847671
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…Credential access [28] Pass hash [79,82,83,117,118] Man-in-the-middle [119] Password cracking [120] Eavesdropping [78,[80][81][82]85,87,97,105,107,111,[121][122][123] Social engineering Discovery [124] Probe [100,125] Lateral/Internal spear-phishing emails Lateral movement [108] Data leakage Collection Cloud data leakage [126] Removable device C&C and Exfiltration Tunneling over protocol [3,76,79,81,92,97,111,115,[124][125][126][127][128][129][130] DOS Impact [4,82,131] Botnet [108] Software update Data fabrication In this section, the findings and analysis of Research Question 1 related to APT features are presented. APT is a hard-to-detect cyber threat group or campaign that may use familiar attacks (such as spear phishing, watering hole, appl...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
“…Credential access [28] Pass hash [79,82,83,117,118] Man-in-the-middle [119] Password cracking [120] Eavesdropping [78,[80][81][82]85,87,97,105,107,111,[121][122][123] Social engineering Discovery [124] Probe [100,125] Lateral/Internal spear-phishing emails Lateral movement [108] Data leakage Collection Cloud data leakage [126] Removable device C&C and Exfiltration Tunneling over protocol [3,76,79,81,92,97,111,115,[124][125][126][127][128][129][130] DOS Impact [4,82,131] Botnet [108] Software update Data fabrication In this section, the findings and analysis of Research Question 1 related to APT features are presented. APT is a hard-to-detect cyber threat group or campaign that may use familiar attacks (such as spear phishing, watering hole, appl...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
“…With the continuous improvement of network attack methods, traditional single‐point‐based detection schemes are challenging to cope with new types of attacks such as Stuxnet, Ocenalotus 1-3 . This mainly results from the limitation of intrusion detection data in a single point, which can not train an effective detection model.…”
Section: Introductionmentioning
confidence: 99%
“…Its common methods are long-term access to the target, and this is a very normal behavior in the IoT. [4][5][6] During this period, they will record network structure, penetrate the target's system, reverse the ACL rules, erase related logs after completing the attack, or deploying "disk-wiping malware" to compromised systems to cover their tracks [7][8][9][10][11] APTs are prepared by professional experts who are organized and well-funded. They make today's security threats increasingly difficult to detect and prevent.…”
Section: Introductionmentioning
confidence: 99%