2013
DOI: 10.1007/978-3-642-40820-5_34
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Search Engine to Uncover Potential Victims for APT Investigations

Abstract: Abstract. Advanced Persistent Threats (APT) are sophisticated and targetoriented cyber attacks which often leverage customized malware and bot control techniques to control the victims for remotely accessing valuable information. As the APT malware samples are specific and few, the signature-based or learning-based approaches are weak to detect them. In this paper, we take a more flexible strategy: developing a search engine for APT investigators to quickly uncover the potential victims based on the attributes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…al. [13] proved that analyzing a huge volume of HTTP requests with Hadoop and Lucene can help to quickly uncover potential victims based on a known APT victim.…”
Section: Security Awareness Trainingmentioning
confidence: 99%
See 1 more Smart Citation
“…al. [13] proved that analyzing a huge volume of HTTP requests with Hadoop and Lucene can help to quickly uncover potential victims based on a known APT victim.…”
Section: Security Awareness Trainingmentioning
confidence: 99%
“…However, they are not as comprehensive as our presented analysis. As for the countermeasures, several academic researchers proposed the use of big data analytics for APT detection [4,13].…”
Section: Related Workmentioning
confidence: 99%
“…Most of the research in the area of APT detection, has focused on analysing already identified APTs [15][16][17][18][19][20][21], or detecting a particular APT that uses a 30 specific piece of malware [22]. Some works have attempted to detect novel APT attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The potential cost of attacks is the major motivation for the investments in intrusion detection and prevention systems [13]. APTs are currently one of the most serious threats to companies and governments [14].Most of the research in the area of APT detection, has focused on analysing already identified APTs [15][16][17][18][19][20][21], or detecting a particular APT that uses a 30 specific piece of malware [22]. Some works have attempted to detect novel APT attacks.…”
mentioning
confidence: 99%
“…In recent years, threats to computer networks have evolved from conventional denial-of-service and malware attacks launched by individuals and small groups of hackers. Organizations now face threats from state-sponsored and organized criminal organizations that deploy targeted, strategic, stealthy, persistent, and multistep attacks that have dire implications, characteristics often associated with a category of threats called advanced persistent threats (Liu, Chen, & Lin, 2013). Such attacks are likely to go unnoticed for several months.…”
Section: Introductionmentioning
confidence: 99%