2020
DOI: 10.1002/cpe.6001
|View full text |Cite
|
Sign up to set email alerts
|

Cyber situation perception for Internet of Things systems based on zero‐day attack activities recognition within advanced persistent threat

Abstract: With the development of the Internet of Things (IoT) technology, various attacks and threats have emerged. The advanced persistent threat (APT) refers to a class of advanced multiple-steps attacks among diverse attack activities, which brings severe threats to the IoT systems ascribe to its pertinence, concealment, and permeability.However, the existing technologies and methods fail to timely recognize the APT attack activities (especially the zero-day exploits) in a comprehensive scope. To address this proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 33 publications
0
15
0
Order By: Relevance
“…Due to these characteristics, APTs are difficult to be detected by traditional detection techniques, such as intrusion detection technology, vulnerability detection technology and malicious code detection technology. 20 IoT have been widely used in modern life. IoT refer to the system composed of interconnected and interrelated devices, objects and sensors.…”
Section: Aptmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to these characteristics, APTs are difficult to be detected by traditional detection techniques, such as intrusion detection technology, vulnerability detection technology and malicious code detection technology. 20 IoT have been widely used in modern life. IoT refer to the system composed of interconnected and interrelated devices, objects and sensors.…”
Section: Aptmentioning
confidence: 99%
“…Due to these characteristics, APTs are difficult to be detected by traditional detection techniques, such as intrusion detection technology, vulnerability detection technology and malicious code detection technology. 20…”
Section: Related Workmentioning
confidence: 99%
“…According to Cheng et al (2020), APTs are a specific class of multi-attacks different from traditional attacks and as such the traditional methods now in place do not solve this type of problem. They are undetectable by conventional technological means as they use "zero-days" technology.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to Cheng et al (2020), even in IoT it is difficult to manage detecting APTs with conventional mechanisms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various advanced multistep attacks are also appearing more and more frequently. Due to their penetration, pertinence, and concealment, they pose a serious threat to the Internet of Things [7]. In addition to this, the types of attacks on the network are becoming more abundant [8], such as worm attacks, vulnerability attacks, denial of service (DoS) attacks, and phishing attacks.…”
Section: Introductionmentioning
confidence: 99%