2018
DOI: 10.1016/j.cose.2017.08.005
|View full text |Cite
|
Sign up to set email alerts
|

Survey of publicly available reports on advanced persistent threat actors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0
7

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 124 publications
(70 citation statements)
references
References 2 publications
0
54
0
7
Order By: Relevance
“…As an open source tools, it also groups as penetration testing or security auditing tools. The action plan for creating the adversary profile are determined in [29] customizable Markov decision processes (MDPs) heuristic to calculate the score. The score is used to calculate the adversary's probabilistic in ordering the different techniques used by the adversary's purposes and based on skills, knowledge etc., The mean and the std deviation are calculated to identify the variances between the actions of the adversaries in listing the profile to secure the assets of the organization.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As an open source tools, it also groups as penetration testing or security auditing tools. The action plan for creating the adversary profile are determined in [29] customizable Markov decision processes (MDPs) heuristic to calculate the score. The score is used to calculate the adversary's probabilistic in ordering the different techniques used by the adversary's purposes and based on skills, knowledge etc., The mean and the std deviation are calculated to identify the variances between the actions of the adversaries in listing the profile to secure the assets of the organization.…”
Section: Resultsmentioning
confidence: 99%
“…In the table II, [29] Matrix it relates the APT groups and the usage of CKC, in launching the attack. Every APT group focuses on their targets for different purposes through different tactic and techniques which is available for the perpetuality at the instance.…”
Section: Cyber Kill Chain (Ckc)mentioning
confidence: 99%
“…Therefore, here we will first review the most important APT threats and groups that have specifically targeted industrial control systems. For the interested reader, a more detailed review of these APTs -including exploited vulnerabilities, software modules, etc -is available at [10].…”
Section: Attack and Defense Models 31 Review Of Existing Apts Apt Smentioning
confidence: 99%
“…84 Crowdstrike's initial findings have been largely supported by other cybersecurity firms and by the Intelligence community. 85 Beyond hacking the campaigns, the Department of Homeland Security (DHS) contacted election officials in 21 states to notify them they have been the targets of Russian government hackers. 86 DHS alerted election officials that Russian hackers were trying to hack both voter registration files and public election sites.…”
Section: Cdd Efforts Against Russia and Their Effectsmentioning
confidence: 99%