2012
DOI: 10.1109/msp.2012.90
|View full text |Cite
|
Sign up to set email alerts
|

Targeted Cyber Attacks - A Superset of Advanced Persistent Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
92
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(93 citation statements)
references
References 3 publications
0
92
0
1
Order By: Relevance
“…For example, spearfishing and [67] malicious websites are common approaches to delivering a malicious payload to a target system [94,134]. RATs embedded in a Trojan horse are then often used to take control of a machine.…”
Section: Modeling Advanced Persistent Threatsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, spearfishing and [67] malicious websites are common approaches to delivering a malicious payload to a target system [94,134]. RATs embedded in a Trojan horse are then often used to take control of a machine.…”
Section: Modeling Advanced Persistent Threatsmentioning
confidence: 99%
“…RATs embedded in a Trojan horse are then often used to take control of a machine. In addition, targeted attacks reportedly employ zero-day vulnerabilities [18,134].…”
Section: Modeling Advanced Persistent Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is problematic especially since defensive measures offered by security vendors typically employ the same signature-based detection approaches that have been used for years. The major drawback of these systems is that the binary patterns required for detection are unlikely to exist at the time of attack, since most APTs are tailored to one specific target and often utilize zero-day exploits [7,48]. In addition, meta-and polymorphic techniques, as well as packers and encryption routines may throw off signature-based systems while the multi-stage nature of APTs makes it generally difficult to interpret findings without additional context [18].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, it is unnecessary for these removed nodes and edges to be adjacent. But, by analyzing kill chain attack mode [16,17], we find that nowadays attacks often follow two steps: to intrude nodes and to destroy nodes. In the first step, the attackers will invade a network node by implanting the virus program into it, but they won't immediately destroy the node after that.…”
Section: Introductionmentioning
confidence: 99%