Filters








12,202 Hits in 6.2 sec

A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat

A. Sarkunavathi, V. Srinivasan
2018 Asian Journal of Computer Science and Technology  
This paper is about the detailed study of Advanced Persistent threats to provide an idea about the advanced attacks.  ...  One type of such attack is Advanced Persistent Threats (APT) which targets the governmental institutions, military, multinational enterprises, financial industry, manufacturing and banks.  ...  A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat  ... 
doi:10.51983/ajcst-2018.7.s1.1797 fatcat:krdhyyftdnc4zbom3zp33j677e

Survey Paper on APT Malware Identification using Malicious DNS and Traffic Analysis

2015 International Journal of Science and Research (IJSR)  
Now a day internet has very big risk of APT (Advanced Persistent Threat). Malware APT can attack remote machine and infect it. After that it can get the personal information.  ...  Further to that we analyze the suspicious IP traffic based on anomaly and signature detection innovation. In this paper we have mentioned the various detection techniques based on the existing work.  ...  Introduction The Advanced Persistent Threat attacks are expanding on the web these days. Unfortunately, they are difficult to detect an APT.  ... 
doi:10.21275/v4i12.nov151928 fatcat:enm6ckxw4nc2jew4pjn7yxy27u

Toward Stream-Based IP Flow Analysis

Tomas Jirsik, Milan Cermak, Daniel Tovarnak, Pavel Celeda
2017 IEEE Communications Magazine  
Some major prevailing challenges for IP flow analysis include, but are not limited to, analysis over a large volume of IP flows, scalability issues, and detecting cyber threats in real time.  ...  Based on information from IP flows, it is possible to discover the majority of concurrent cyber threats in high-speed, large-scale networks.  ...  Acknowledgement This research was supported by the Technology Agency of the Czech Republic under No. TA04010062 Technology for processing and analysis of network data in big data concept.  ... 
doi:10.1109/mcom.2017.1600972 fatcat:v7bxvqyfsfggzmxbvsj5xeqftm

Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection

Artur Rot, Boguslaw Olszewski
2017 Position Papers of the 2017 Federated Conference on Computer Science and Information Systems  
According to Kaspersky Lab research, APT -Advanced Persistent Threatsare one of the biggest threats in IT as of 2016.  ...  This article showcases the problem of APT, the biggest threats related to them, and chosen methods and tools that can be effectively used to counter APT attacks.  ...  These remain universal, despite a large body of knowledge and counterstrategies. It's the network access and the attack itself that make the persistent threats advanced.  ... 
doi:10.15439/2017f488 dblp:conf/fedcsis/RotO17 fatcat:qlavigka25hj5orem3d2dsan2a

A survey on network intrusion detection system techniques

K. Nandha Kumar, S. Sukumaran
2018 International Journal of Advanced Technology and Engineering Exploration  
Conflicts of interest The authors have no conflicts of interest to declare.  ...  In [26] suggested a work for advanced persistent threats and 100 hidden units were used in the proposed deep neural network (DNN) and combined with ADAM optimizer and Rectified Linear Unit activation  ...  In [19] author analyzed the advanced persistent threat (APT) that uses different kinds of attack methods for accessing unauthorized system at the initial stage afterwards it slowly mingle throughout  ... 
doi:10.19101/ijatee.2018.546013 fatcat:lr6uh7abmrb6ppxwxhixpof57m

A Quantitative Framework to Model Advanced Persistent Threats

Luan Huy Pham, Massimiliano Albanese, Benjamin W. Priest
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
In recent years, Advanced Persistent Threats (APTs) have emerged as increasingly sophisticated cyber attacks, often waged by state actors or other hostile organizations against high-profile targets.  ...  APT actors employ a diversified set of sophisticated tools and advanced capabilities to penetrate target systems, evade detection, and maintain a foothold within compromised systems for extended periods  ...  CONCLUSIONS In recent years, Advanced Persistent Threats (APTs) have emerged as increasingly sophisticated cyber attacks, often waged by state actors or other hostile organizations against high-profile  ... 
doi:10.5220/0006872604480459 dblp:conf/icete/PhamAP18 fatcat:osx4dyfggjhczjil3xwbc44lzy

MAD: A Middleware Framework for Multi-step Attack Detection

Panagiotis Papadopoulos, Thanasis Petsas, Giorgos Christou, Giorgos Vasiliadis
2015 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)  
Signature-based network intrusion detection systems (NIDS) are one of the most popular tools used to detect and stop malicious attacks or unwanted actions.  ...  Unfortunately, the ever increasing network traffic and capacity make the collection and archiving of multi-gigabit network streams very challenging.  ...  The rest of the paper is organized as follows. In Section II we describe the notion of the multi-step attacks and the advanced persistent threats.  ... 
doi:10.1109/badgers.2015.012 dblp:conf/badgers/PapadopoulosPCV15 fatcat:yxqx7u74nne6dkln7rpllrus74

SPHINX Cross-layer anomaly detection framework v1

Radu Popescu, Dana Oniga
2020 Zenodo  
: Data Traffic Monitoring (DTM) and Anomaly Detection (AD).  ...  These components are included in the Automated Cyber Security Risk Assessment block, one of the main high-level SPHINX Architecture building blocks, which deals with advanced and automated tools to assess  ...  traffic and high traffic volume.  ... 
doi:10.5281/zenodo.4010499 fatcat:cyqgqjkhxnecddvs6xia5rc7ki

A Study on the Integrated Security System based Real-time Network Packet Deep Inspection

Chang-Su Moon, Sun-Hyung Kim
2014 International Journal of Security and Its Applications  
With the volume of Internet communication continuing to increase, there are more cases of worm and virus intrusion through the network.  ...  As such, enterprises are investing in various measures for an integrated security system to identify the threats of network security-based security vulnerabilities and cope with theme effectively.  ...  ., in the high-volume network environment.  ... 
doi:10.14257/ijsia.2014.8.1.11 fatcat:3q3uarlnwrbhrldqtht2jckm5m

A Model of APT Attack Defense Based on Cyber Threat Detection [chapter]

Yue Li, Teng Zhang, Xue Li, Ting Li
2019 Communications in Computer and Information Science  
The targets of Advanced Persistent Threat (APT) are mainly concentrate on national key information infrastructure, key research institutes, and large commercial companies, for the purpose of stealing sensitive  ...  And the persisted evolution ability destroyed the traditional protection methods based on feature detection.  ...  It is necessary to conduct manual analysis and tracing for the high-risk threats or high-risk events based on threat intelligence big data platform, network probes and terminal probes.  ... 
doi:10.1007/978-981-13-6621-5_10 fatcat:t2drr2kpore4vnkik6asbtmrfq

Automated Simulation P2P Botnets Signature Detection by Rule-based Approach

Raihana Syahirah, Faizal M.A., Zul Azri, Nurulhuda Ahmad
2016 International Journal of Advanced Computer Science and Applications  
In order to detect these botnets, a complete flow analysis is necessary.  ...  The rule-based approach have high detection accuracy and low false positive.  ...  Botnets has been declared as Advanced Malware (AM) and Advanced Persistent Threat (APT) listed attacks which able to manipulate advanced technology where the intricacy of threats need for continuous detection  ... 
doi:10.14569/ijacsa.2016.070819 fatcat:n2e5rubjm5arxhmtdhkc6dnhiy

UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETWORK SINET

Ruo Ando, Youki Kadobayashi, Hiroki Takakura, Hiroshi Itoh
2021 Zenodo  
Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations.  ...  For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.  ...  [20] presents the evaluation of machine learning algorithms by Waikato Environment for Knowledge Analysis (WEKA) for the detection of DoS attack in wireless sensor network.  ... 
doi:10.5281/zenodo.5771309 fatcat:avv7kgzqd5dhff52vl3sifazj4

Testbed-based Evaluation of SIEM Tool for Cyber Kill Chain Model in Power Grid SCADA System

Vivek Kumar Singh, Steven Perez Callupe, Manimaran Govindarasu
2019 2019 North American Power Symposium (NAPS)  
This paper presents the application of Security Onion (SecOn) to develop the network security monitoring (NSM) and intrusion detection system (IDS) in the context of SCADA cyber physical security.  ...  Since the interdependence between the legacy grid infrastructure and advanced information technology is growing rapidly, there are numerous ways advanced, motivated, and persistent attackers can affect  ...  Different analysis tools such as Sguil, Kibana and Squert can be utilized to monitor and visualize the SCADA network. 2) Network Intrusion Detection System (NIDS): NIDS monitors and analyzes network traffic  ... 
doi:10.1109/naps46351.2019.9000344 fatcat:x4tpq5u57rahjh6k3kinvgkixa

SDN Architecture Impact on Network Security

Krzysztof Cabaj, Jacek Wytrębowicz, Sławomir Kukliński, Paweł Radziszewski, Khoa Truong Dinh
2014 Position Papers of the 2014 Federated Conference on Computer Science and Information Systems  
Due to the fact that all unknown traffic must be transmitted for investigation to the controller, maliciously crafted traffic can lead to Denial Of Service (DoS) attack on it.  ...  The Software Defined Networking (SDN) paradigm introduces separation of data and control planes for flow-switched networks and enables different approaches to network security than those existing in present  ...  Examples of such threats are: a stealth scanning concerning whole network, a set of infected machines, and the advanced persistent threats (APT) [10] .  ... 
doi:10.15439/2014f473 dblp:conf/fedcsis/CabajWKRD14 fatcat:pmpbg6bnbjcelbb7wifd5xne7a

A New Proposal on the Advanced Persistent Threat: A Survey

Santiago Quintero-Bonilla, Angel Martín del Rey
2020 Applied Sciences  
An advanced persistent threat (APT) can be defined as a targeted and very sophisticated cyber attack. IT administrators need tools that allow for the early detection of these attacks.  ...  Recently, machine learning techniques have been implemented in these approaches to improve the problem of detection.  ...  Acknowledgments: The authors would like to recognise the work of the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.3390/app10113874 fatcat:ldphc5czj5evjp5nllbc7csg5a
« Previous Showing results 1 — 15 out of 12,202 results