2020
DOI: 10.1007/s12652-020-01840-3
|View full text |Cite
|
Sign up to set email alerts
|

APT attack detection algorithm based on spatio-temporal association analysis in industrial network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(24 citation statements)
references
References 26 publications
0
20
0
Order By: Relevance
“…This means that there is a lack of contribution to defending against mobile APTs. This study identified 60 primary studies of which 40 primary studies focused on APT detection [1,3,[5][6][7]28,76,86,97,98,100,106,111,115,[124][125][126][127][128][129]134,[136][137][138][139]142,172,173,176], six primary studies focused on APT protection [4,91,92,118,121,125], four primary studies focused on APT mitigation [142][143][144][145], three primary studies focused on APT identification [98,107,146], and [116] focused on the detection and response to APTs as shown in Table 5.…”
Section: Rq2: What Are the Proposed Defensive Mechanisms Available To...mentioning
confidence: 99%
“…This means that there is a lack of contribution to defending against mobile APTs. This study identified 60 primary studies of which 40 primary studies focused on APT detection [1,3,[5][6][7]28,76,86,97,98,100,106,111,115,[124][125][126][127][128][129]134,[136][137][138][139]142,172,173,176], six primary studies focused on APT protection [4,91,92,118,121,125], four primary studies focused on APT mitigation [142][143][144][145], three primary studies focused on APT identification [98,107,146], and [116] focused on the detection and response to APTs as shown in Table 5.…”
Section: Rq2: What Are the Proposed Defensive Mechanisms Available To...mentioning
confidence: 99%
“…Another detection method in an ICS, [26], used a spatiotemporal association analysis method to detect intrusions in industrial networks. It focused on feature mining and retrieval methods of historical attacks between the features of APT attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The ability of SBI model to detect APT attacks at the first potential victim is evaluated using accuracy detection measurements which are typically used in the other studies to clarify experiments [45]. This measurement depends on a true positive (TP, the number of malicious behaviour correctly classified as malicious), true negative (TN, the number of normal behaviour correctly classified as normal), false positive (FP, the number of normal behaviour wrongly classified as a malicious), false negative (FN, the number of malicious behaviour wrongly classified as a normal.…”
Section: Evaluation Metricsmentioning
confidence: 99%