APT datasets and attack modeling for automated detection methods: A review
B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics
A Zimba, H Chen, Z Wang, M Chishimba - Future Generation Computer …, 2020 - Elsevier
Abstract Advanced Persistent Threats (APT) present the most sophisticated types of attacks
to modern networks which have proved to be very challenging to address. Using …
to modern networks which have proved to be very challenging to address. Using …
A novel kill-chain framework for remote security log analysis with SIEM software
BD Bryant, H Saiedian - computers & security, 2017 - Elsevier
Network security investigations pose many challenges to security analysts attempting to
identify the root cause of security alarms or incidents. Analysts are often presented with …
identify the root cause of security alarms or incidents. Analysts are often presented with …
Terminaptor: Highlighting advanced persistent threats through information flow tracking
G Brogi, VVT Tong - 2016 8th IFIP International Conference on …, 2016 - ieeexplore.ieee.org
Long lived attack campaigns known as Advanced Persistent Threats (APTs) have emerged
as a serious security risk. These attack campaigns are customised for their target and …
as a serious security risk. These attack campaigns are customised for their target and …
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
S Krishnapriya, S Singh - Computers, Materials & Continua, 2024 - search.ebscohost.com
The increase in number of people using the Internet leads to increased cyberattack
opportunities. Advanced Persistent Threats, or APTs, are among the most dangerous …
opportunities. Advanced Persistent Threats, or APTs, are among the most dangerous …
An efficient classification model for detecting advanced persistent threat
S Chandran, P Hrudya… - … conference on advances …, 2015 - ieeexplore.ieee.org
Among most of the cyber attacks that occured, the most drastic are advanced persistent
threats. APTs are differ from other attacks as they have multiple phases, often silent for long …
threats. APTs are differ from other attacks as they have multiple phases, often silent for long …
A Markov multi-phase transferable belief model for cyber situational awareness
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents
concerned with critical information exfiltration from High Valued Targets (HVTs). Existing …
concerned with critical information exfiltration from High Valued Targets (HVTs). Existing …
Modeling attack process of advanced persistent threat using network evolution
W Niu, X Zhang, G Yang, R Chen… - … on Information and …, 2017 - search.ieice.org
Advanced Persistent Threat (APT) is one of the most serious network attacks that occurred in
cyberspace due to sophisticated techniques and deep concealment. Modeling APT attack …
cyberspace due to sophisticated techniques and deep concealment. Modeling APT attack …
Survey on APT attack detection in industrial cyber-physical system
Y Shi, W Li, Y Zhang, X Deng, D Yin… - … Technology and Smart …, 2021 - ieeexplore.ieee.org
With the gradual evolution of industrial cyber-physical system (ICPS) into an interconnected
and open intelligent control system, the advanced persistent threat (APT) has turned into …
and open intelligent control system, the advanced persistent threat (APT) has turned into …
Towards mitigation of data exfiltration techniques using the MITRE ATT&CK framework
M Mundt, H Baier - International Conference on Digital Forensics and …, 2021 - Springer
Network-based attacks and their mitigation are of increasing importance in our ever-
connected world. Besides denial of service a major goal of today's attackers is to gain …
connected world. Besides denial of service a major goal of today's attackers is to gain …