Zobrazeno 1 - 10
of 1 055
pro vyhledávání: '"Advanced Persistent Threat"'
Autor:
Burak Gulbay, Mehmet Demirci
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 57, Iss , Pp 101791- (2024)
Addressing the expanding Advanced Persistent Threat (APT) landscape is crucial for governments, enterprises and threat intelligence research groups. While defenders often rely on tabular formats for assets like logs, alerts, firewall rules; attackers
Externí odkaz:
https://doaj.org/article/9c0698d76e5a458697626b1b27a6a295
Autor:
Tang, Mingsheng a, ⁎, Ge, Binbin b
Publikováno v:
In Computers & Security March 2025 150
Autor:
Yuancheng LI, Yukun LIN
Publikováno v:
Tongxin xuebao, Vol 45, Pp 106-114 (2024)
To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models
Externí odkaz:
https://doaj.org/article/c2fa129a62c64330bc33ce05f259f488
Publikováno v:
Data in Brief, Vol 54, Iss , Pp 110290- (2024)
The novel dataset called Linux-APT Dataset 2024 captures Advanced Persistent Threat (APT) attacks along with other latest and sophisticated payloads. Existing datasets lacks latest attacker's techniques and procedures, APTs tactics and configuration
Externí odkaz:
https://doaj.org/article/7ebbe35a04d24bbb9a2e8de3d1735abe
Autor:
Alfan Presekal, Alexandru Stefanov, Vetrivel Subramaniam Rajkumar, Ioannis Semertzis, Peter Palensky
Publikováno v:
IEEE Access, Vol 12, Pp 177746-177771 (2024)
Power systems are undergoing rapid digitalization. This introduces new vulnerabilities and cyber threats in future Cyber-Physical Power Systems (CPPS). Some of the most notable incidents include the cyber attacks on the power grid in Ukraine in 2015,
Externí odkaz:
https://doaj.org/article/d6091d69c1604619b82d2ed97deb4fd5
Autor:
Zheng-Shao Chen, R. Vaitheeshwari, Eric Hsiao-Kuang Wu, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Asad Ali
Publikováno v:
IEEE Access, Vol 12, Pp 141851-141865 (2024)
Advanced Persistent Threat (APT) groups pose significant cybersecurity threats due to their sophisticated and persistent nature. This study introduces a novel methodology to understand their collaborative patterns and shared objectives, which is cruc
Externí odkaz:
https://doaj.org/article/fc5ade556af345fa93441377d79f694b
Publikováno v:
IEEE Access, Vol 12, Pp 8536-8551 (2024)
Recent stealth attacks cleverly disguise malicious activities, masquerading as ordinary connections to popular online services through seemingly innocuous applications. These methods often evade detection by traditional network monitoring or signatur
Externí odkaz:
https://doaj.org/article/d1642090ab5c4d38bd79652f24865ac3
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Heliyon, Vol 10, Iss 4, Pp e26317- (2024)
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is defined as any activity that allows adversaries to progressively move deeper into a system in seek of high-value assets. Although this timely subject has been stud
Externí odkaz:
https://doaj.org/article/e17501312c25484c91f29078d6837782
Publikováno v:
IEEE Access, Vol 11, Pp 91949-91968 (2023)
Since cyberattacks have become sophisticated in the form of advanced persistent threats (APTs), predicting and defending the APT attacks have drawn lots of attention. Although there have been related studies such as attack graphs, Hidden Markov Model
Externí odkaz:
https://doaj.org/article/e6870a7cea6b4acf8338d2d01a31a9e9