2018 21st Saudi Computer Society National Computer Conference (NCC) 2018
DOI: 10.1109/ncg.2018.8593143
|View full text |Cite
|
Sign up to set email alerts
|

The “Stuxnet” Virus of 2010 As an Example of A “APT” and Its “Recent” Variances

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Experimental evaluation of the proposed model found very efficient in tracking ransomware attacks with high detection accuracy. Finally, the authors of [24] suggested a hybrid detection model combining classical auto-encoding (CAE) and variational auto-encoding (VAE) deep learning techniques to reduce data dimension and obtain a precise representation of the activities. The extracted features were combined to form a new vector used to train a deep neural network (DNN) classifier.…”
Section: Protocols Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Experimental evaluation of the proposed model found very efficient in tracking ransomware attacks with high detection accuracy. Finally, the authors of [24] suggested a hybrid detection model combining classical auto-encoding (CAE) and variational auto-encoding (VAE) deep learning techniques to reduce data dimension and obtain a precise representation of the activities. The extracted features were combined to form a new vector used to train a deep neural network (DNN) classifier.…”
Section: Protocols Attacksmentioning
confidence: 99%
“…Virus, Trojan Horse, and Worms. An attacker could send malicious code to MTU after launching a MitM or Masquerade attack [24][25][26]. Malicious code can either allow unauthorized users to access the infected system and use it to launch other attacks on other infrastructure, or it could spread to the network and infect MSU/MTU, often causing unstable behavior or even total system collapse [27,28].…”
mentioning
confidence: 99%
“…Stuxnet was the first known cyberattack on SCADA systems; it was used to gain knowledge about the operation of the system and then used to take control of devices in the network and cause their failure. After Stuxnet, several modifications of the worm have been identified: Duqu, Flame, or Gauss [53]. These variations of the original cyberattack were used to spy on industries, people, and banks.…”
Section: Security Threats In Substation Automation Systemsmentioning
confidence: 99%
“…Finally, the authors of [24] suggested a hybrid detection model combining classical auto-encoding (CAE) and variational auto-encoding (VAE) deep learning techniques to reduce data dimension and obtain a precise representation of the activities. The extracted features were combined to form a new vector used to train a deep neural network (DNN) classifier.…”
Section: Ransomware Attacksmentioning
confidence: 99%