Zobrazeno 1 - 10
of 134
pro vyhledávání: '"APT attack"'
Autor:
Cho Do Xuan, Tung Thanh Nguyen
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-19 (2024)
Abstract To enhance the effectiveness of the Advanced Persistent Threat (APT) detection process, this research proposes a new approach to build and analyze the behavior profiles of APT attacks in network traffic. To achieve this goal, this study carr
Externí odkaz:
https://doaj.org/article/8adc37f10081473ca0b8cb6b1cce9073
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-14 (2024)
Abstract Nowadays, the malicious MS-Office document has already become one of the most effective attacking vectors in APT attacks. Though many protection mechanisms are provided, they have been proved easy to bypass, and the existed detection methods
Externí odkaz:
https://doaj.org/article/c8d5f31f4a8941998af1c735a12f89dc
Autor:
Weng, Zhengqiu a, Zhang, Weinuo a, Zhu, Tiantian b, Dou, Zhenhao a, Sun, Haofei b, Ye, Zhanxiang c, d, ⁎, Tian, Ye b
Publikováno v:
In Journal of Network and Computer Applications January 2025 233
Publikováno v:
Tongxin xuebao, Vol 45, Pp 117-130 (2024)
In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenanc
Externí odkaz:
https://doaj.org/article/2bd238073ff042bda482b0c2450c2280
Publikováno v:
Dianxin kexue, Vol 40, Pp 47-55 (2024)
The optimal active defense decision can ensure the security and stability of wireless communication networks.In order to improve the defense effectiveness of wireless communication networks, an optimal active defense decision model for wireless commu
Externí odkaz:
https://doaj.org/article/2545c55200a741c5b976d3d2e1e81467
Publikováno v:
Symmetry, Vol 16, Iss 11, p 1551 (2024)
With the continuous development of network security situations, the types of attacks increase sharply, but can be divided into symmetric attacks and asymmetric attacks. Symmetric attacks such as phishing and DDoS attacks exploit fixed patterns, resul
Externí odkaz:
https://doaj.org/article/68bcd61a7286401593d54e81ec91572b
Publikováno v:
网络与信息安全学报, Vol 9, Pp 1-19 (2023)
The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with t
Externí odkaz:
https://doaj.org/article/8ae2b1a757ed44908cb9287c1cbad9a6
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 16, Iss 1, Pp 1-14 (2023)
Abstract Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks that pose significant challenges to the information security of governments and enterprises. Traditional detection methods struggle to extract long-ter
Externí odkaz:
https://doaj.org/article/bcc654bc721b47c0bdd54c5afbbe16a0
Publikováno v:
Tongxin xuebao, Vol 43, Pp 66-76 (2022)
Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stage
Externí odkaz:
https://doaj.org/article/3a8cf981f5b8466b9c81cb1a02e9c1f8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.