Zobrazeno 1 - 10
of 1 013
pro vyhledávání: '"Advanced persistent threat"'
Autor:
Burak Gulbay, Mehmet Demirci
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 57, Iss , Pp 101791- (2024)
Addressing the expanding Advanced Persistent Threat (APT) landscape is crucial for governments, enterprises and threat intelligence research groups. While defenders often rely on tabular formats for assets like logs, alerts, firewall rules; attackers
Externí odkaz:
https://doaj.org/article/9c0698d76e5a458697626b1b27a6a295
Publikováno v:
IEEE Access, Vol 12, Pp 8536-8551 (2024)
Recent stealth attacks cleverly disguise malicious activities, masquerading as ordinary connections to popular online services through seemingly innocuous applications. These methods often evade detection by traditional network monitoring or signatur
Externí odkaz:
https://doaj.org/article/d1642090ab5c4d38bd79652f24865ac3
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Data in Brief, Vol 54, Iss , Pp 110290- (2024)
The novel dataset called Linux-APT Dataset 2024 captures Advanced Persistent Threat (APT) attacks along with other latest and sophisticated payloads. Existing datasets lacks latest attacker's techniques and procedures, APTs tactics and configuration
Externí odkaz:
https://doaj.org/article/7ebbe35a04d24bbb9a2e8de3d1735abe
Publikováno v:
Heliyon, Vol 10, Iss 4, Pp e26317- (2024)
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is defined as any activity that allows adversaries to progressively move deeper into a system in seek of high-value assets. Although this timely subject has been stud
Externí odkaz:
https://doaj.org/article/e17501312c25484c91f29078d6837782
Publikováno v:
IEEE Access, Vol 11, Pp 91949-91968 (2023)
Since cyberattacks have become sophisticated in the form of advanced persistent threats (APTs), predicting and defending the APT attacks have drawn lots of attention. Although there have been related studies such as attack graphs, Hidden Markov Model
Externí odkaz:
https://doaj.org/article/e6870a7cea6b4acf8338d2d01a31a9e9
Autor:
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty
Publikováno v:
IEEE Access, Vol 11, Pp 74000-74020 (2023)
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) techniques have shown potential in
Externí odkaz:
https://doaj.org/article/fd808c29ee9e42858fa8dd7ee4dab98b
Autor:
Michal Kida, Oluwafemi Olukoya
Publikováno v:
IEEE Access, Vol 11, Pp 1148-1165 (2023)
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attributio
Externí odkaz:
https://doaj.org/article/127133565bc5496c9e0aeb08f82edab2
Autor:
Jaafer Al-Saraireh, Ala' Masarweh
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 4, Pp 45-55 (2022)
Cyber security has been drawing massive attention in recent years due to human reliance on new technology, and systems. Therefore, securing these systems against cyber-attacks has become an essential task nowadays. The advanced persistent threat is o
Externí odkaz:
https://doaj.org/article/80c9d220576147c0b4a008786dbb9a2e
Publikováno v:
Jisuanji kexue, Vol 49, Iss 9, Pp 306-311 (2022)
Power system network is one of the important targets of cyber attack.In order to ensure the safe operation of power system,network managers need to evaluate the network security risk.Usually,existing network security risk assessment framework only ai
Externí odkaz:
https://doaj.org/article/5f2e5ef3f7d042a4988c706b32b88d82