IEEEĪlbanese M, Jajodia S, Noel S (2012) Time-efficient and cost-effective network hardening using attack graphs. In 18th Annual Computer Security Applications Conference, 2002. Furthermore, the survey addresses various research scopes in the domain of APT cyber-attacks.Īdelstein F, Stillerman M, Kozen D (2002) Malicious code detection for open firmware. This work also addresses the APT attack attribution and countermeasures against these attacks from classical signature and heuristic based detection to modern machine learning and genetics based detection mechanisms along with sophisticated zero-day and negative day malware countermeasure by various techniques like monitoring of network traffic and DNS logs, moving target based defense, and attack graph based defenses. The survey covers a detailed discussion on APT attack phases and comparative study on threat life-cycle specification by various organizations. This paper provides a comprehensive survey on the evolution of advanced malware design paradigms, APT attack vector and its anatomy, APT attack Tactics, Techniques, and Procedures (TTP) and specific case studies on open-ended APT attacks. These attacks also include advanced zero-day and negative-day exploits and payloads. Developing defense mechanisms and performing attribution analysis of such advanced attacks are extremely difficult due to the intricate design of attack vector and sophisticated malware employed with high stealth and evasive techniques. The precocious cyber weapons, targeted and motivated with some specific intention are called as Advanced Persistent Threats (APT). They have equipped with the most advanced malware and maintain a hidden attribution. In today’s cyber warfare realm, every stakeholder in cyberspace is becoming more potent by developing advanced cyber weapons.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |