Advanced Persistent Threats Based on Supply Chain Vulnerabilities: Challenges, Solutions, and Future Directions

被引:0
|
作者
Tan, Zhuoran [1 ]
Parambath, Shameem Puthiya [1 ]
Anagnostopoulos, Christos [1 ]
Singer, Jeremy [1 ]
Marnerides, Angelos K. [2 ,3 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow City G12 8RZ, Scotland
[2] Univ Cyprus, KIOS Ctr Excellence, CY-1678 Nicosia, Cyprus
[3] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 06期
关键词
Supply chains; Security; Malware; Surveys; Reconnaissance; Payloads; Systematic literature review; Internet of Things; Weapons; Vectors; Advanced persistent threats (APTs); classification; defense methods; supply chain attack (SCA); CYBERSECURITY; SECURITY; ATTACK; SYSTEM;
D O I
10.1109/JIOT.2025.3528744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the ever increasing interdependency across a variety of diverse software and hardware components in information and communications technology (ICT) provisioning, supply chain vulnerabilities (SCVs) targeting such dependencies have evolved as a primary choice for malicious actors to stealthy and complex cyber-attacks. The current modus operandi in the cyber threat spectrum is solely correlated with advanced persistent threats (APTs) that have shown to be prevalent across diversified attacks underpinning cyberwarfare and cybercrime. Hence, defense against such threats is undoubtedly considered as a high priority on a global scale. Nonetheless, the reliance on third-party supply chain software and device across diverse ICT ecosystems, combined with the current defense mechanisms' inability to identify specific compromised entry points, results in an increased risk of APTs. This survey explores the state-of-the-art to stratify and showcase the properties of supply chain-based APTs, elaborate on reported risks from such APTs, and expand on existing defense methods. This study connects academic research with industry practices to highlight a new and growing problem. It examines supply chain compromises, offers unique insight into how these exploitations occur, and equips cybersecurity practitioners with the knowledge required to design next-generation APT defense mechanisms.
引用
收藏
页码:6371 / 6395
页数:25
相关论文
共 50 条
  • [21] Cybersecurity in the Oil and Gas Sector: Vulnerabilities, Solutions, and Future Directions
    Pothana, Prasad
    Gokapai, Vasanth
    Ramaseri-Chandra, Ananth N.
    2024 CYBER AWARENESS AND RESEARCH SYMPOSIUM, CARS 2024, 2024,
  • [22] Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions
    Zhukabayeva, Tamara
    Zholshiyeva, Lazzat
    Karabayev, Nurdaulet
    Khan, Shafiullah
    Alnazzawi, Noha
    SENSORS, 2025, 25 (01)
  • [23] A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats
    Ahmed, Yussuf
    Asyhari, A. Taufiq
    Rahman, Md Arafatur
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2497 - 2513
  • [24] Challenges, solutions and future directions in evaluative research
    Raine, Rosalind
    Fitzpatrick, Ray
    de Pury, John
    JOURNAL OF HEALTH SERVICES RESEARCH & POLICY, 2016, 21 (04) : 215 - +
  • [25] Sensing as a Service: Challenges, Solutions and Future Directions
    Sheng, Xiang
    Tang, Jian
    Xiao, Xuejie
    Xue, Guoliang
    IEEE SENSORS JOURNAL, 2013, 13 (10) : 3733 - 3741
  • [26] Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
    Said El Kafhali
    Iman El Mir
    Mohamed Hanini
    Archives of Computational Methods in Engineering, 2022, 29 : 223 - 246
  • [27] Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
    El Kafhali, Said
    El Mir, Iman
    Hanini, Mohamed
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (01) : 223 - 246
  • [28] Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions
    Adil, Muhammad
    Khan, Muhammad Khurram
    Kumar, Neeraj
    Attique, Muhammad
    Farouk, Ahmed
    Guizani, Mohsen
    Jin, Zhanpeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 19046 - 19069
  • [29] Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions
    Mekala, Sri Harsha
    Baig, Zubair
    Anwar, Adnan
    Zeadally, Sherali
    COMPUTER COMMUNICATIONS, 2023, 208 : 294 - 320
  • [30] A decade of supply chain collaboration and directions for future research
    Soosay, Claudine Antoinette
    Hyland, Paul
    SUPPLY CHAIN MANAGEMENT-AN INTERNATIONAL JOURNAL, 2015, 20 (06) : 613 - 630