Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection

@inproceedings{Rot2017AdvancedPT,
  title={Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection},
  author={Artur Rot and Boguslaw Olszewski},
  booktitle={FedCSIS},
  year={2017}
}
According to Kaspersky Lab research, APT – Advanced Persistent Threats – are one of the biggest threats in IT as of 2016. Organised groups, keeping contact in various languages, have attacked the IT systems of financial institutions, government, military and diplomatic agencies, telecom and power supply companies, politicians and activists, and private companies, and these attacks were global in scope. APT should be seen as a complex phenomenon, an existing danger to companies, organisations… Expand
Proposed Framework for Effective Detection and Prediction of Advanced Persistent Threats Based on the Cyber Kill Chain
The cost of data breach resulting from cyber attacks is estimated to be $3.62 million dollars worldwide according to a report. Advanced Persistent Threat (APT) is a targeted cyber attack that isExpand
A SURVEY OF DIGITAL FORENSIC METHODS UNDER ADVANCED PERSISTENT THREAT IN FOG COMPUTING ENVIRONMENT
DA Digital forensics has been recently become a significant approach to investigate cybercrimes. Several questions exist about the future of this domain. Many researchers have been done in this fieldExpand
Early Phase Warning Solution About System Security Based on Log Analysis
TLDR
The research "Early warning solution about system security based on log analysis" is extremely necessary, because it can help to warn and detect early-attacking information when there are abnormal signs in systems via logs. Expand
The intelligent agent-based information security model for cloud
Today’s era is the era of cloud computing and agent-based processing. Data security and integrity are achieved by information security systems, which ensure the continuity of business and protectExpand
Discovering Suspicious APT Behaviors by Analyzing DNS Activities
TLDR
A new feature that represents the relationship between a DNS request and the response message is proposed, based on a deep learning method used to analyze the DNS request records, that can effectively detect the hidden and suspicious DNS behavior in APT. Expand
APT datasets and attack modeling for automated detection methods: A review
TLDR
The major achievement is the description and analysis of existing feature extraction methodologies and detailed overview of datasets used in APT detection related literature, showing that the large enterprise network use case, has incorporated a much more frequent use of datasets with quite short periods of time. Expand
AN INVESTIGATOR DIGITAL FORENSICS FREQUENCIES PARTICLE SWARM OPTIMIZATION FOR DETECTION AND CLASSIFICATION OF APT ATTACK IN FOG COMPUTING ENVIRONMENT (IDF-FPSO)
The hough there are several approaches to detect the malware attacks in cloud, the detection techniques could not be applied in FOG based environment. This is because of its possession of distinctExpand
Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
TLDR
A method for APT detection System for real time corporate and banking organizations is proposed by using Long Short Term Memory (LSTM) Neural networks in order to analyze huge amount of SIEM (Security Information and Event Management) system event logs. Expand
Identifying the Top Threats in Cloud Computing and Its Suggested Solutions: A Survey
TLDR
This survey presents the most critical threats to cloud computing with its impacts, its reasons, and some suggested solutions, and determines what the main aspects of the cloud and the security attributes that are affected by each one of these threats. Expand
Evaluating user vulnerabilities vs phisher skills in spear phishing
TLDR
The relationships between the two major constructs namely ‘user vulnerabilities’ and ‘email contextualization’ are explored through the theory of planned behavior with the objective to find out the major factors that lead to computer users biting the phishers’ bait. Expand
...
1
2
...

References

SHOWING 1-3 OF 3 REFERENCES
How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats
With the tremendous popularity of mobile devices an d their increasing adoption in the corporate environments, there is a larger oppor tunity for Advanced Persistent Threats (APTs) to exploitExpand
Detection of Advanced Persistent Threat by Analyzing the Big Data Log
This paper proposes and verifies the algorithm to detect the advanced persistent threat early through real-time network monitoring and combinatorial analysis of big data log. Moreover, provide resultExpand
Zarządzanie ryzykiem w cyberprzestrzeni – wybrane zagadnienia teorii i praktyki ” , Projektowanie i realizacja systemow informatycznych zarzadzania