Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies 2016
DOI: 10.1145/2905055.2905360
|View full text |Cite
|
Sign up to set email alerts
|

Advance Persistent Threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…2) We also assumed that the number of Bots that can simultaneously launch attacks is limited, so for a Flooding attack, Bots have to send as many packets as possible [33], [8]]. Today, many other types of DDoS attacks occur.…”
Section: Issues and Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…2) We also assumed that the number of Bots that can simultaneously launch attacks is limited, so for a Flooding attack, Bots have to send as many packets as possible [33], [8]]. Today, many other types of DDoS attacks occur.…”
Section: Issues and Limitationsmentioning
confidence: 99%
“…FCs cause a large amount of traffic to surge simultaneously, causing dramatic stress on the server's network links and resulting in considerable loss of packets and network congestion at last. Although Flooding DDoS attacks are often launched by Botnets [33], [15], the master (attacker) in a Botnet orders compromised hosts (Bots) to simultaneously send packets to deplete the victims resources (e.g., memory, network bandwidth), eventually leaving the victim's system paralyzed [29]. Not only wired networks but also wireless networks [12] face resource constraints, such as limited bandwidth and less memory.…”
Section: Introductionmentioning
confidence: 99%
“…Detection is challenging using traditional defense methodologies [2] as they tend to stay inside the network or repeat intrusions multiple times, until they are able to accomplish their goals [3]. As highly complex, sophisticated and well-resourced threats, they are often aimed towards the government sector [4] [5]. The goal of an APT attack is not just to gather a target entitys data, but to accomplish it undetected [6].…”
Section: Introductionmentioning
confidence: 99%
“…Most recent hacking attacks use Advance Persistent Threat (APT) with unknown vulnerabilities. [3], [22] In addition, the changes and evolution of the attacks are very fast. For this reason, the kind of framework to constantly evaluate the latest vulnerabilities and variant malicious codes is needed, rather than to verify detection capability by evaluating(identifying) the APT attack identification of information security system against past attacks.. That is, it is assumed that the requirement to verify the real function as the information security system in a real environment is premised, rather than receiving a license or a certificate.…”
Section: Introductionmentioning
confidence: 99%