2022
DOI: 10.1016/j.cose.2022.102875
|View full text |Cite
|
Sign up to set email alerts
|

APT beaconing detection: A systematic review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 75 publications
0
3
0
Order By: Relevance
“…The authors of [33] discussed the strategies and procedures that can be utilized to identify APTs, specifically to recognize beaconing, during the lifecycle of an APT.…”
Section: Detection Of Apt On Mobile Devices Based On Applications And...mentioning
confidence: 99%
“…The authors of [33] discussed the strategies and procedures that can be utilized to identify APTs, specifically to recognize beaconing, during the lifecycle of an APT.…”
Section: Detection Of Apt On Mobile Devices Based On Applications And...mentioning
confidence: 99%
“… References No. of studies Duration Framework/model Hussain et al [ 15 ] 8 2011–2017 Industrial control system APT defence framework Jabar and Singh [ 16 ] 112 2011–2022 A conceptual framework for identifying and mitigating the severity of abnormal activities across the entire APT lifecycle Talib et al [ 17 ] 122 2007–2022 Not proposed Kotenko et al [ 18 ] 127 2010–2021 Not proposed Khalid et al [ 19 ] 48 2017–2022 Not proposed Model proposed in this paper 75 2012–2022 Effective Cyber Situational Awareness Model to Detect and Predict Mobile APTs (ECSA-tDP-MAPT) based on network traffic …”
Section: Introductionmentioning
confidence: 99%
“…Talib et al [ 17 ] presented a comprehensive analysis of potential APT beaconing detection solutions that can ensure the safety of target organisations. They focused mainly on techniques and strategies that detect C&C malware and beaconing during a targeted APT.…”
Section: Introductionmentioning
confidence: 99%
“…Network attack behaviors, particularly advanced-persistent-threat (APT) attacks, exhibit characteristics including high destructiveness, extreme stealthiness, and long incubation periods. These attacks can carry out targeted attacks and covert theft of critical assets, especially CPSs, making CPSs significant factors affecting the security of government and enterprise networks [2]. Therefore, the network security concern is pressing.…”
Section: Introductionmentioning
confidence: 99%
“…However, CPS attack behavior data have often been scarce, making it challenging to collect a comprehensive dataset [6]. (2) Difficulty in selecting high-dimensional data features: CPS attack behavior samples encompass numerous data features related to network interactions. Handling high-dimensional data has not only increased storage and computational costs but has also posed challenges to uncovering hidden features of attack behaviors [7].…”
Section: Introductionmentioning
confidence: 99%