2016 8th International Conference on Cyber Conflict (CyCon) 2016
DOI: 10.1109/cycon.2016.7529438
|View full text |Cite
|
Sign up to set email alerts
|

Countering Advanced Persistent Threats through security intelligence and big data analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…Mirco Marchetti [13] designed and evaluated a novel framework that is tailored to support security analysts in detecting APTs. The proposed framework uses multifactor approaches where big data analytics methods are applied to internal and external information to support human specialists so that those specialists can focus their security and intelligence analyses on the subset of hosts that are most likely to have been compromised.…”
Section: (Ii)mentioning
confidence: 99%
“…Mirco Marchetti [13] designed and evaluated a novel framework that is tailored to support security analysts in detecting APTs. The proposed framework uses multifactor approaches where big data analytics methods are applied to internal and external information to support human specialists so that those specialists can focus their security and intelligence analyses on the subset of hosts that are most likely to have been compromised.…”
Section: (Ii)mentioning
confidence: 99%
“…The literature also contains papers on desktop banking trojans. The methods used in these papers do not necessarily apply to Android trojans as the the Android OS presents very different characteristics and environment for which new tools are required [38], [26]. Criscione et al present Zarathustra [12], a tool to detect web-inject based trojans that leverages the fact that web pages are rendered differently on clean machines and on infected machines.…”
Section: Literature On Desktop Banking Trojansmentioning
confidence: 99%
“…Network traffic and client data analysis, form multiple network locations, using both signature and anomaly detection methods derived from the intelligent data analysis field, has been proposed by De Vries et al (2012). An intrusion detection system with the ability to detect the possibility of initial intrusions, as well as using security intelligence and big data analytics was proposed by (Marchetti et al, 2016). An automatic training system that generates simulated training emails using an email client has been proposed by (Iwata et al, 2017).…”
Section: Research On Apt Countermeasuresmentioning
confidence: 99%
“…As a highly sophisticated, well-resourced threats aimed primarily towards the government sector (Thakar and Parekh, 2016), the goal of an APT attack is not to just gather a target entity's data, but to accomplish it undetected (Alshamrani et al, 2019). While the majority of cyber-attacks rely on automated scanning and exploitation of known vulnerabilities over large sets of targets (Marchetti et al, 2016), APT attacks are highly targeted attacks, with a clear goal typically targeting governments or business targets with substantial intellectual property value (Chen et al, 2014, Vert et al, 2014. Reports of APT attacks targeting high-profile organizations, ranging from large-scale enterprises and financial institutions to government sectors continue to occur unabated (Yang et al, 2018).…”
Section: Introductionmentioning
confidence: 99%