2014
DOI: 10.1007/978-3-662-44885-4_5
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Advanced Persistent Threats

Abstract: A recent class of threats, known as Advanced Persistent Threats (APTs), has drawn increasing attention from researchers, primarily from the industrial security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the specificity of these threats and as such an objective approach to th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
124
0
7

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 237 publications
(153 citation statements)
references
References 7 publications
(6 reference statements)
0
124
0
7
Order By: Relevance
“…1) PBNE: To this end, given a sequence of beliefs, we can obtain the corresponding DBNE via C k in a backward fashion. However, given a sequence of policies, both players forwardly update their beliefs at each stage by (2). Thus, we need to find a consistent pair of belief and policy sequences.…”
Section: B Multistage Bayesian Game and Pbnementioning
confidence: 99%
See 1 more Smart Citation
“…1) PBNE: To this end, given a sequence of beliefs, we can obtain the corresponding DBNE via C k in a backward fashion. However, given a sequence of policies, both players forwardly update their beliefs at each stage by (2). Thus, we need to find a consistent pair of belief and policy sequences.…”
Section: B Multistage Bayesian Game and Pbnementioning
confidence: 99%
“…Then, they compute the DBNE strategy pair σ * ,0:K i , ∀i ∈ {1, 2}, under the given belief sequence at each stage by solving program C k from stage K to stage 0 in sequence. Next, they update their beliefs at each stage according to the strategy pair σ * ,0:K−1 i , ∀i ∈ {1, 2}, via the Bayesian update (2). If the strategy pair σ * ,0:K−1 i , ∀i ∈ {1, 2}, satisfies (5) under the updated belief, we find the ε-PBNE and terminate the iteration.…”
Section: B Multistage Bayesian Game and Pbnementioning
confidence: 99%
“…Advanced Persistent Threat (APT) refers to a long-term attack method employed by a group of attackers targeting specific organisations, governmental institutions, commercial enterprises in order to infiltrate the system for monetary or espionage purposes [27,37,38]. This is unlike other traditional attack methods where an attack is launched on a one-time basis.…”
Section: Advanced Persistent Threatmentioning
confidence: 99%
“…Nowadays, attacks on the network are becoming more and more complex, and, among them, APT attacks are increasingly frequent [1]. Unlike traditional attacks, APT attacks are not launched to interrupt services, but to steal intellectual property rights and sensitive data [2].…”
Section: Introductionmentioning
confidence: 99%