Advanced Persistent Threats - Detection and Defense

被引:0
|
作者
Vukalovic, J. [1 ]
Delija, D. [1 ]
机构
[1] INsig2 Ltd, Buzinska Cesta 58, Zagreb 10010, Croatia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The term "Advanced Persistent Threat" refers to a well-organized, malicious group of people who launch stealthy attacks against computer systems of specific targets, such as governments, companies or military. The attacks themselves are long-lasting, difficult to expose and often use very advanced hacking techniques. Since they are advanced in nature, prolonged and persistent, the organizations behind them have to possess a high level of knowledge, advanced tools and competent personnel to execute them. The attacks are usually preformed in several phases - reconnaissance, preparation, execution, gaining access, information gathering and connection maintenance. In each of the phases attacks can be detected with different probabilities. There are several ways to increase the level of security of an organization in order to counter these incidents. First and foremost, it is necessary to educate users and system administrators on different attack vectors and provide them with knowledge and protection so that the attacks are unsuccessful. Second, implement strict security policies. That includes access control and restrictions (to information or network), protecting information by encrypting it and installing latest security upgrades. Finally, it is possible to use software IDS tools to detect such anomalies (e.g. Snort, OSSEC, Sguil).
引用
收藏
页码:1324 / 1330
页数:7
相关论文
共 50 条
  • [1] An adaptive defense mechanism to prevent advanced persistent threats
    Xie, Yi-xi
    Ji, Li-xin
    Li, Ling-shu
    Guo, Zehua
    Baker, Thar
    [J]. CONNECTION SCIENCE, 2021, 33 (02) : 359 - 379
  • [2] Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
    Chen, Ziqin
    Chen, Guanpu
    Hong, Yiguang
    [J]. UNMANNED SYSTEMS, 2024, 12 (02) : 341 - 358
  • [3] Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement
    Khosravi-Farmad, Masoud
    Ramaki, Ali Ahmadian
    Bafghi, Abbas Ghaemi
    [J]. 2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2018, : 280 - 285
  • [4] Defense Against Advanced Persistent Threats with Expert System for Internet of Things
    Hu, Qing
    Lv, Shichao
    Shi, Zhiqiang
    Sun, Limin
    Xiao, Liang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 326 - 337
  • [5] Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
    Gan, Chenquan
    Lin, Jiabin
    Huang, Da-Wen
    Zhu, Qingyi
    Tian, Liang
    [J]. MATHEMATICS, 2023, 11 (14)
  • [6] Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [7] Multi-layered Defense against Advanced Persistent Threats (APT)
    Torii, Satoru
    Morinaga, Masanobu
    Yoshioka, Takashi
    Terada, Takeaki
    Unno, Yuki
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2014, 50 (01): : 52 - 59
  • [8] Evidence-Based Detection of Advanced Persistent Threats
    Tecuci, Gheorghe
    Marcu, Dorin
    Meckl, Steven
    Boicu, Mihai
    [J]. COMPUTING IN SCIENCE & ENGINEERING, 2018, 20 (06) : 54 - 65
  • [9] The Influences of Feature Sets on the Detection of Advanced Persistent Threats
    Hofer-Schmitz, Katharina
    Kleb, Ulrike
    Stojanovic, Branka
    [J]. ELECTRONICS, 2021, 10 (06) : 1 - 22
  • [10] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848