2018
DOI: 10.1007/978-3-030-04648-4_42
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

Abstract: Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 21 publications
(50 reference statements)
0
14
0
Order By: Relevance
“…Bodström and Hämäläinen have utilized Observe-Orient-Decide-Act (OODA) loop and Black Swan Theory for detection and identification of APT attacks [33]. In this paper, without manipulating and reducing the features, the network data stream is transferred to the detection process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bodström and Hämäläinen have utilized Observe-Orient-Decide-Act (OODA) loop and Black Swan Theory for detection and identification of APT attacks [33]. In this paper, without manipulating and reducing the features, the network data stream is transferred to the detection process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In our previous paper [1], we proposed a novel method for detecting (APT) attacks by using OODA loop and Black Swan theory. The purpose of the method is to take into account current detection problems and improve detection rate for earlier unknown attacks, which is currently quite low.…”
Section: Current Detection Problemsmentioning
confidence: 99%
“…For example, TCP/IP packet header and data fields have a maximum length of 1500 bytes in Ethernet network and spread over 27 dimensions. As was stated in our earlier paper [1], we implemented the DL stack in a way that it takes the data input in binary form. Dimensionality is high, as 1500 bytes represent 12,000 dimensions in binary, however each dimension has the value of 0 or 1, thus data standardisation is not needed in input layer.…”
Section: Data Dimensionsmentioning
confidence: 99%
See 2 more Smart Citations