“…To simulate APT attacks, we follow the typical cyber kill chain model that consists of roughly 7 nonexclusive phases, i.e., reconnaissance (identify a target and explore its vulnerabilities), weaponize (design a backdoor and a penetration plan), delivery (deliver the weapon), exploitation (victim triggers the vulnerability), installation (install the backdoor or malware), command and control (C&C) (give remote instructions to the victim), and actions on objectives [131].…”