scholarly journals Advanced Persistent Threat Detection and Defence (APT)

Author(s):  
Hassan Adeyoola

as the growth and popularity of technology has become simultaneous ascend in both impacts and numbers of cyber criminals thanks to the web. For many years, the organization has strived in ways of preventing any attacks from cyber-criminal with advanced techniques. Cybercriminals and intruders are developing a more advanced way to breach the security surface of an organization. Advanced Persistent Threats are also known as APT are new and a lot more sophisticated version for multistep attack scenarios that are known and are targeted just to achieve a goal most commonly undercover activities. this report, there will cover everything I know that tells us about APT with more word and brief explanations

2021 ◽  
Vol 2113 (1) ◽  
pp. 012037
Author(s):  
Luoli Wang

Abstract Advanced Persistent Threats (APT) have caused severe damage to the core information infrastructure of many governments and organizations. APT attacks usually remain low and slow which makes them difficult to be detected. In this case, the way of correlatively analyzing massive logs generated by various security devices for effectively detecting the new type of cyber threat turns out to be more and more significant. In this paper, on the basis of analyzing the principles and characteristics of APT, we propose an intelligent threat detection method based on the expanded Cyber Attack Chain (CAC) model and the long short-term memory network (LSTM) autoencoder to extensively correlate malicious behaviors from spatial and temporal dimensions, which provides a brain new idea for the application and practice of complex network attack detection.


Author(s):  
Adam Khalid ◽  
Anazida Zainal ◽  
Mohd Aizaini Maarof ◽  
Fuad A. Ghaleb

Author(s):  
Gbadebo Ayoade ◽  
Khandakar Ashrafi Akbar ◽  
Pracheta Sahoo ◽  
Yang Gao ◽  
Anmol Agarwal ◽  
...  

2016 ◽  
Vol 109 ◽  
pp. 127-141 ◽  
Author(s):  
Mirco Marchetti ◽  
Fabio Pierazzi ◽  
Michele Colajanni ◽  
Alessandro Guido

2018 ◽  
Author(s):  
Ibrahim Ghafir ◽  
Mohammad Hammoudeh ◽  
Vaclav Prenosil

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which may contain disguised executable files. This paper presents the disguised executable file detection (DeFD) module, which aims at detecting disguised exe files transferred over the connections. The detection is based on a comparison between the MIME type of the transferred file and the file name extension. This module was experimentally evaluated and the results show successful detection of disguised executable files.


Sign in / Sign up

Export Citation Format

Share Document