Advanced Persistent Threats Based on Supply Chain Vulnerabilities: Challenges, Solutions, and Future Directions

被引:0
|
作者
Tan, Zhuoran [1 ]
Parambath, Shameem Puthiya [1 ]
Anagnostopoulos, Christos [1 ]
Singer, Jeremy [1 ]
Marnerides, Angelos K. [2 ,3 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow City G12 8RZ, Scotland
[2] Univ Cyprus, KIOS Ctr Excellence, CY-1678 Nicosia, Cyprus
[3] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 06期
关键词
Supply chains; Security; Malware; Surveys; Reconnaissance; Payloads; Systematic literature review; Internet of Things; Weapons; Vectors; Advanced persistent threats (APTs); classification; defense methods; supply chain attack (SCA); CYBERSECURITY; SECURITY; ATTACK; SYSTEM;
D O I
10.1109/JIOT.2025.3528744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the ever increasing interdependency across a variety of diverse software and hardware components in information and communications technology (ICT) provisioning, supply chain vulnerabilities (SCVs) targeting such dependencies have evolved as a primary choice for malicious actors to stealthy and complex cyber-attacks. The current modus operandi in the cyber threat spectrum is solely correlated with advanced persistent threats (APTs) that have shown to be prevalent across diversified attacks underpinning cyberwarfare and cybercrime. Hence, defense against such threats is undoubtedly considered as a high priority on a global scale. Nonetheless, the reliance on third-party supply chain software and device across diverse ICT ecosystems, combined with the current defense mechanisms' inability to identify specific compromised entry points, results in an increased risk of APTs. This survey explores the state-of-the-art to stratify and showcase the properties of supply chain-based APTs, elaborate on reported risks from such APTs, and expand on existing defense methods. This study connects academic research with industry practices to highlight a new and growing problem. It examines supply chain compromises, offers unique insight into how these exploitations occur, and equips cybersecurity practitioners with the knowledge required to design next-generation APT defense mechanisms.
引用
收藏
页码:6371 / 6395
页数:25
相关论文
共 50 条
  • [1] Combating Advanced Persistent Threats: Challenges and Solutions
    Wang, Yuntao
    Liu, Han
    Li, Zhendong
    Su, Zhou
    Li, Jiliang
    IEEE NETWORK, 2024, 38 (06): : 324 - 333
  • [2] Digital supply chain: challenges and future directions
    Ageron, Blandine
    Bentahar, Omar
    Gunasekaran, Angappa
    SUPPLY CHAIN FORUM, 2020, 21 (03): : 133 - 138
  • [3] Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions
    Sobb, Theresa
    Turnbull, Benjamin
    Moustafa, Nour
    ELECTRONICS, 2020, 9 (11) : 1 - 31
  • [4] Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats
    Nicho, Mathew
    McDermott, Christopher D.
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 521 - 525
  • [5] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18
  • [6] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [7] Modeling an Agile Supply Chain: Research Challenges and Future Directions
    Verma, Savita
    Jain, Vipul
    Majumdar, Abhijit
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 277 - +
  • [8] Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions
    Tani, Hamed alqah
    Kumar, Gulshan
    ACM COMPUTING SURVEYS, 2025, 57 (04)
  • [9] On the Vulnerabilities of Landmark-based Data Location Approaches: Threats, Solutions, and Challenges
    Irain, Malik
    Jorda, Jacques
    Mammeri, Zoubir
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 127 - 134
  • [10] Blockchain-enabled supply chain: analysis, challenges, and future directions
    Sohail Jabbar
    Huw Lloyd
    Mohammad Hammoudeh
    Bamidele Adebisi
    Umar Raza
    Multimedia Systems, 2021, 27 : 787 - 806