A Research on Architecture of APT Attack Detection and Countering Technology

被引:0
|
作者
Chen R.-D. [1 ]
Zhang X.-S. [1 ]
Niu W.-N. [2 ]
Lan H.-Y. [1 ]
机构
[1] Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu
[2] College of Cyber Security, Sichuan University, Chengdu
关键词
APT attacks; Attack detection; Attacking technology classification; Defense scheme;
D O I
10.3969/j.issn.1001-0548.2019.06.011
中图分类号
学科分类号
摘要
Advanced persistent threat (APT) is a new kind of cyber-attack as a growth security events. This paper analysis more than 150 typical APT cases happened during last decade, and constructs the analytical model of APT attack, indicates 4 major problems of APT attack detection and countering: the fragile penetration protection problem, the low detection accuracy, the difficulty of determining the attack forensic, and the slow response to the unknown attack problem. In the meanwhile, this paper analyzes typical APT attacks in recent years, mines the association based on attacking tools. According to the experiments, there are similarity patterns between the tools used by the same organization. In summary, the integral APT defense scheme in this paper includes the latest achievements of four types of defense schemes, plays an academic supporting role in building a unified attack detection and traceability countermeasure platform. © 2019, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
页码:870 / 879
页数:9
相关论文
共 50 条
  • [31] A novel approach for APT attack detection based on combined deep learning model
    Cho Do Xuan
    Mai Hoang Dao
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (20): : 13251 - 13264
  • [32] A Multi-stage APT Attack Detection Method Based on Sample Enhancement
    Xie, Lixia
    Li, Xueou
    Yang, Hongyu
    Zhang, Liang
    [J]. CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 209 - 216
  • [33] A novel approach for APT attack detection based on combined deep learning model
    Cho Do Xuan
    Mai Hoang Dao
    [J]. Neural Computing and Applications, 2021, 33 : 13251 - 13264
  • [34] Research on application of DDos attack detection technology based on software defined network
    Jing, Guo
    [J]. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 2017, 62 (01): : 489 - 498
  • [35] Research on Adversarial Attack Technology for Object Detection in Physical World Based on Vision
    Liu, HaiTian
    Wang, Feng
    Du, JunChao
    [J]. 2022 ASIA CONFERENCE ON ALGORITHMS, COMPUTING AND MACHINE LEARNING (CACML 2022), 2022, : 638 - 648
  • [36] The Study of APT Attack Stage Model
    Li, Meicong
    Huang, Wei
    Wang, Yongbin
    Fan, Wenqing
    Li, Jianfang
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 1299 - 1303
  • [37] Attack Technology Research for Web Service
    SU Guangnan
    FENG Yongxin
    [J]. 沈阳理工大学学报, 2014, 33 (02) : 88 - 94
  • [38] Countering Block Withholding Attack Efficiently
    Lee, Suhyeon
    Kim, Seungjoo
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 330 - 335
  • [39] A quantifiable Attack-Defense Trees model for APT attack
    Fei, Yu
    Ning, Jing
    Jiang, Wenbao
    [J]. PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2303 - 2306
  • [40] Layered Security Architecture for Masquerade Attack Detection
    Saljooghinejad, Hamed
    Bhukya, Wilson Naik
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 255 - 262