Zobrazeno 1 - 10
of 1 035
pro vyhledávání: '"Advanced persistent threat"'
Autor:
Burak Gulbay, Mehmet Demirci
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 57, Iss , Pp 101791- (2024)
Addressing the expanding Advanced Persistent Threat (APT) landscape is crucial for governments, enterprises and threat intelligence research groups. While defenders often rely on tabular formats for assets like logs, alerts, firewall rules; attackers
Externí odkaz:
https://doaj.org/article/9c0698d76e5a458697626b1b27a6a295
Publikováno v:
Data in Brief, Vol 54, Iss , Pp 110290- (2024)
The novel dataset called Linux-APT Dataset 2024 captures Advanced Persistent Threat (APT) attacks along with other latest and sophisticated payloads. Existing datasets lacks latest attacker's techniques and procedures, APTs tactics and configuration
Externí odkaz:
https://doaj.org/article/7ebbe35a04d24bbb9a2e8de3d1735abe
Autor:
Yuancheng LI, Yukun LIN
Publikováno v:
Tongxin xuebao, Vol 45, Pp 106-114 (2024)
To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models
Externí odkaz:
https://doaj.org/article/c2fa129a62c64330bc33ce05f259f488
Autor:
Zheng-Shao Chen, R. Vaitheeshwari, Eric Hsiao-Kuang Wu, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Asad Ali
Publikováno v:
IEEE Access, Vol 12, Pp 141851-141865 (2024)
Advanced Persistent Threat (APT) groups pose significant cybersecurity threats due to their sophisticated and persistent nature. This study introduces a novel methodology to understand their collaborative patterns and shared objectives, which is cruc
Externí odkaz:
https://doaj.org/article/fc5ade556af345fa93441377d79f694b
Publikováno v:
IEEE Access, Vol 12, Pp 8536-8551 (2024)
Recent stealth attacks cleverly disguise malicious activities, masquerading as ordinary connections to popular online services through seemingly innocuous applications. These methods often evade detection by traditional network monitoring or signatur
Externí odkaz:
https://doaj.org/article/d1642090ab5c4d38bd79652f24865ac3
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Heliyon, Vol 10, Iss 4, Pp e26317- (2024)
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is defined as any activity that allows adversaries to progressively move deeper into a system in seek of high-value assets. Although this timely subject has been stud
Externí odkaz:
https://doaj.org/article/e17501312c25484c91f29078d6837782
Publikováno v:
IEEE Access, Vol 11, Pp 91949-91968 (2023)
Since cyberattacks have become sophisticated in the form of advanced persistent threats (APTs), predicting and defending the APT attacks have drawn lots of attention. Although there have been related studies such as attack graphs, Hidden Markov Model
Externí odkaz:
https://doaj.org/article/e6870a7cea6b4acf8338d2d01a31a9e9
Autor:
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty
Publikováno v:
IEEE Access, Vol 11, Pp 74000-74020 (2023)
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) techniques have shown potential in
Externí odkaz:
https://doaj.org/article/fd808c29ee9e42858fa8dd7ee4dab98b
Autor:
Michal Kida, Oluwafemi Olukoya
Publikováno v:
IEEE Access, Vol 11, Pp 1148-1165 (2023)
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attributio
Externí odkaz:
https://doaj.org/article/127133565bc5496c9e0aeb08f82edab2