APT-Dt-KC: advanced persistent threat detection based on kill-chain model

Author(s):  
Maryam Panahnejad ◽  
Meghdad Mirabi
Author(s):  
Adam Khalid ◽  
Anazida Zainal ◽  
Mohd Aizaini Maarof ◽  
Fuad A. Ghaleb

Author(s):  
Hassan Adeyoola

as the growth and popularity of technology has become simultaneous ascend in both impacts and numbers of cyber criminals thanks to the web. For many years, the organization has strived in ways of preventing any attacks from cyber-criminal with advanced techniques. Cybercriminals and intruders are developing a more advanced way to breach the security surface of an organization. Advanced Persistent Threats are also known as APT are new and a lot more sophisticated version for multistep attack scenarios that are known and are targeted just to achieve a goal most commonly undercover activities. this report, there will cover everything I know that tells us about APT with more word and brief explanations


Author(s):  
Gbadebo Ayoade ◽  
Khandakar Ashrafi Akbar ◽  
Pracheta Sahoo ◽  
Yang Gao ◽  
Anmol Agarwal ◽  
...  

2016 ◽  
Vol 109 ◽  
pp. 127-141 ◽  
Author(s):  
Mirco Marchetti ◽  
Fabio Pierazzi ◽  
Michele Colajanni ◽  
Alessandro Guido

2018 ◽  
Author(s):  
Ibrahim Ghafir ◽  
Mohammad Hammoudeh ◽  
Vaclav Prenosil

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which may contain disguised executable files. This paper presents the disguised executable file detection (DeFD) module, which aims at detecting disguised exe files transferred over the connections. The detection is based on a comparison between the MIME type of the transferred file and the file name extension. This module was experimentally evaluated and the results show successful detection of disguised executable files.


2018 ◽  
Author(s):  
Ibrahim Ghafir ◽  
Mohammad Hammoudeh ◽  
Vaclav Prenosil

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which may contain disguised executable files. This paper presents the disguised executable file detection (DeFD) module, which aims at detecting disguised exe files transferred over the connections. The detection is based on a comparison between the MIME type of the transferred file and the file name extension. This module was experimentally evaluated and the results show successful detection of disguised executable files.


Sign in / Sign up

Export Citation Format

Share Document