2021
DOI: 10.1016/j.comnet.2021.107937
|View full text |Cite
|
Sign up to set email alerts
|

Discovering unknown advanced persistent threat using shared features mined by neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…-Shang et al 26 Neural networks for identifying the unknown APT attack based on the shared features.…”
Section: Authors Methods Advantages Disadvantagesmentioning
confidence: 99%
See 1 more Smart Citation
“…-Shang et al 26 Neural networks for identifying the unknown APT attack based on the shared features.…”
Section: Authors Methods Advantages Disadvantagesmentioning
confidence: 99%
“…The processing time assumed by the proposed model was high. Shang et al 26 introduced neural networks for identifying the unknown APT attack based on the shared features. Moreover, the proposed method resolved the issues caused by the unidentified malicious network flow.…”
Section: Motivationmentioning
confidence: 99%
“…After successfully compromising the target network, the APT attacker continuously invades the internal core network devices based on the control of the internal network devices already gained, which usually requires establishing a command and control communication channel between the C&C server and the target infected host [ 16 , 17 , 18 , 19 ]. In this process, the data transmitted between the malware and the C&C server are usually encrypted with SSL, so it is difficult for the target network’s defense system to determine whether the data transmitted in the communication channel are malicious communication with the C&C server or normal communication with a normal external server.…”
Section: Related Workmentioning
confidence: 99%
“…Real-time applications based on IoT-Cloud servers are most prone to security attacks as per the above literature and discussion. Delay is also a major factor for encryption and decryption, where attackers can obtain easy entry to the servers' channels; delay can give rise to many attacks [15]. Data sensitivity matters a lot, e.g., financial statements can be grouped into bags of words and data can be categorized into three groups.…”
Section: Problem Definition and Motivationmentioning
confidence: 99%
“…Advanced Persistent Threats (APTs): These types of threats are made by an unauthorized person who tries to obtain access of the system to gain the data rather than destroy it [15].…”
mentioning
confidence: 99%