Evolution of Advanced Persistent Threat (APT) Attacks and Actors
Autor: | Dan-Wei (Marian) Wen, Gu Hsin Lai, Chia-Mei Chen |
---|---|
Rok vydání: | 2019 |
Předmět: |
Advanced persistent threat
Computer science Social engineering (security) 020206 networking & telecommunications 02 engineering and technology computer.software_genre Computer security Phishing Server 0202 electrical engineering electronic engineering information engineering Command and control Malware Cyber-attack 020201 artificial intelligence & image processing computer Hacker |
Zdroj: | Communications in Computer and Information Science ISBN: 9789811391897 ICS |
DOI: | 10.1007/978-981-13-9190-3_7 |
Popis: | Advanced Persistent Threat (APT) has become one of the most complicated and intractable cyber attack over the last decade. As APT attacks are conducted through series of actions that comprise social engineering, phishing, command and control servers, and remote desktop control, conventional anti-virus mechanisms become insufficient because they were designed to cope with traditional stand-alone malware attacks. Furthermore, data transmission from the compromised network to the APT actors is usually well disguised and embedded in normal transmission, exacerbating the detection of APT attacks to the point that even major anti-virus firms are not sure about the ratio of discovered APT attacks against real attacks. To make things worse, APT actors tend to be well-organized and potentially government-funded groups of hackers and professionals who are capable of developing and maintaining malware specifically made for their own purposes and interpret the stolen data. While most efforts in defending against APT attacks focus on related technologies, this research argues the importance of constructing a holistic understanding by analyzing the behaviors and changes of ATP attacks and actors. This research aims to understand the evolution of technologies and malware on the one hand and the behavioral changes of attacking groups. By doing so, this research is expected to contribute to constructing a clearer roadmap of APT attacks and actors that cyber security providers can use as reference. |
Databáze: | OpenAIRE |
Externí odkaz: |