2015
DOI: 10.1007/978-3-319-24584-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Proposed Approach for Targeted Attacks Detection

Abstract: Abstract. For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise Internet infrastructure. Targeted attack or advanced persistent threat (APT) attack is a new challenge and aims to accomplish a specific goal, most often espionage. APTs are presently the biggest threat to governments and organizations. This paper st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
18
0
3

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 7 publications
0
18
0
3
Order By: Relevance
“…Security and privacy issues are a major vulnerability to any technology, this can become quite serious if not treated correctly by adopting the appropriate methods [15], [16], [17], [18], [19], [20]. It has been known in recent years that RFID contactless cards have one of the most serious vulnerabilities due to the accessibility of RFID readers that can be bought online.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy issues are a major vulnerability to any technology, this can become quite serious if not treated correctly by adopting the appropriate methods [15], [16], [17], [18], [19], [20]. It has been known in recent years that RFID contactless cards have one of the most serious vulnerabilities due to the accessibility of RFID readers that can be bought online.…”
Section: Related Workmentioning
confidence: 99%
“…To address those weaknesses, a new approach for APT detection has been presented in [14], and this paper is a step towards developing the proposed system.…”
Section: Related Workmentioning
confidence: 99%
“…A novel approach for APT detection is proposed in [14]. The suggested system undergoes two main phases, the first one detects eight techniques commonly used in APT life cycle.…”
mentioning
confidence: 99%
“…With the emergence of smart cities, the opportunities of gain for malicious attackers have grown, along with their motivation. Great damage and substantial financial loss have been caused by malware, botnets [3,4] and targeted attacks [5,6] through deceiving the user to connect to malicious domains or websites [7,8]. Although intrusion detection systems [9] and monitoring tools [10,11] play a significant role in the network security, the human factor should be taken into consideration.…”
Section: Introductionmentioning
confidence: 99%