A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …

Modeling realistic adversarial attacks against network intrusion detection systems

G Apruzzese, M Andreolini, L Ferretti… - … Threats: Research and …, 2022 - dl.acm.org
The incremental diffusion of machine learning algorithms in supporting cybersecurity is
creating novel defensive opportunities but also new types of risks. Multiple researches have …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

DAPT 2020-constructing a benchmark dataset for advanced persistent threats

S Myneni, A Chowdhary, A Sabur, S Sengupta… - … Machine Learning for …, 2020 - Springer
Abstract Machine learning is being embraced by information security researchers and
organizations alike for its potential in detecting attacks that an organization faces …

Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics

A Zimba, H Chen, Z Wang, M Chishimba - Future Generation Computer …, 2020 - Elsevier
Abstract Advanced Persistent Threats (APT) present the most sophisticated types of attacks
to modern networks which have proved to be very challenging to address. Using …

The challenges of leveraging threat intelligence to stop data breaches

A Ibrahim, D Thiruvady, JG Schneider… - Frontiers in Computer …, 2020 - frontiersin.org
Despite the significant increase in cybersecurity solutions investment, organizations are still
plagued by security breaches, especially data breaches. As more organizations experience …

APT beaconing detection: A systematic review

MA Talib, Q Nasir, AB Nassif, T Mokhamed… - Computers & …, 2022 - Elsevier
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …

Hidden markov model and cyber deception for the prevention of adversarial lateral movement

MAR Al Amin, S Shetty, L Njilla, DK Tosh… - IEEE …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …

Holistic security and safety for factories of the future

E Maia, S Wannous, T Dias, I Praça, A Faria - Sensors, 2022 - mdpi.com
The accelerating transition of traditional industrial processes towards fully automated and
intelligent manufacturing is being witnessed in almost all segments. This major adoption of …