2023
DOI: 10.3390/app13148056
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review and a Conceptual Framework Proposition for Advanced Persistent Threats (APT) Detection for Mobile Devices Using Artificial Intelligence Techniques

Abstract: Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 185 publications
(349 reference statements)
0
0
0
Order By: Relevance
“…Since smart healthcare implements IoMT devices, APT attackers can exploit the weaknesses in smart devices, software, or network infrastructure to illegally gain access to steal sensitive patient healthcare information and compromise the integrity of medical data or medical devices, which can threaten the lives of patients [73]. Before attackers launch APTs, social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging are used for collecting the required data about the target, and a successful APT attack typically lasts for a long time [74]. Advanced persistent threats are difficult to detect and prevent since human behavioral variables leading to threats are not considered, there is no evident attack fingerprint, and adversaries conceal their identity while taking advantage of the weaknesses in the compromised system [70][74] [75].…”
Section: Advanced Persistent Threatmentioning
confidence: 99%
“…Since smart healthcare implements IoMT devices, APT attackers can exploit the weaknesses in smart devices, software, or network infrastructure to illegally gain access to steal sensitive patient healthcare information and compromise the integrity of medical data or medical devices, which can threaten the lives of patients [73]. Before attackers launch APTs, social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging are used for collecting the required data about the target, and a successful APT attack typically lasts for a long time [74]. Advanced persistent threats are difficult to detect and prevent since human behavioral variables leading to threats are not considered, there is no evident attack fingerprint, and adversaries conceal their identity while taking advantage of the weaknesses in the compromised system [70][74] [75].…”
Section: Advanced Persistent Threatmentioning
confidence: 99%