2021 3rd International Cyber Resilience Conference (CRC) 2021
DOI: 10.1109/crc50527.2021.9392626
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Persistent Threat Detection: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…When considering attackers, understanding the approach of common Advanced Persistent Threats (APTs) is highly beneficial to security [32]. The authors of [33] determined that each APT has a defined target and the campaigns are typically launched by an established organization. They emphasized that security professionals need to understand how these intrusion methods are executed and how to detect them [33].…”
Section: Surveys On Threat Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…When considering attackers, understanding the approach of common Advanced Persistent Threats (APTs) is highly beneficial to security [32]. The authors of [33] determined that each APT has a defined target and the campaigns are typically launched by an established organization. They emphasized that security professionals need to understand how these intrusion methods are executed and how to detect them [33].…”
Section: Surveys On Threat Managementmentioning
confidence: 99%
“…The authors of [33] determined that each APT has a defined target and the campaigns are typically launched by an established organization. They emphasized that security professionals need to understand how these intrusion methods are executed and how to detect them [33]. These sophisticated threats require more than normal IDSs as the attackers are highly knowledgeable [33].…”
Section: Surveys On Threat Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…When compared to signature-based detection, anomaly-based detection could be proposed to detect any divergent patterns from normal events in the network (a baseline profile). However, attackers often circumvent the detector by treating network events and system calls as temporal sequences, resulting in underperforming APT detection [6].…”
Section: Introductionmentioning
confidence: 99%
“…According to Croom [30], to defend against Advanced Persistent Threats (APTs), defenders first need to understand how attackers operate. APTs have been classified as sophisticated and targeted attacks [71]. APTs emerged as one of the most dangerous attack types and targeted various organisations from the domains of IT, corporate and government organisations [61].…”
Section: Perception Layer Security Challengesmentioning
confidence: 99%