2022
DOI: 10.5772/intechopen.99291
|View full text |Cite
|
Sign up to set email alerts
|

DMAPT: Study of Data Mining and Machine Learning Techniques in Advanced Persistent Threat Attribution and Detection

Abstract: Modern-day malware is intelligent enough to hide its presence and perform stealthy operations in the background. Advance Persistent Threat (APT) is one such kind of malware attack on sensitive corporate and banking networks to stay there for a long time undetected. In real-time corporate networks, identifying the presence of intruders is a big challenging task for security experts. Recent APT attacks like Carbanak, The Big Bang, and Red Echo attack (targeting the Indian power sector) are ringing alarms globall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
(22 reference statements)
0
2
0
Order By: Relevance
“…In recent times, however, ML has increasingly found its way into the realm of cybersecurity applications [9][10][11][12] and, subsequently, the detection of APT attacks [1,13]. Common ML methods in the latter domain include signature-based detection, behaviour-based detection, monitoring [17] and data mining [18]. Regarding APT attacks, however, not many works deal with this aspect of cybersecurity.…”
Section: Related Workmentioning
confidence: 99%
“…In recent times, however, ML has increasingly found its way into the realm of cybersecurity applications [9][10][11][12] and, subsequently, the detection of APT attacks [1,13]. Common ML methods in the latter domain include signature-based detection, behaviour-based detection, monitoring [17] and data mining [18]. Regarding APT attacks, however, not many works deal with this aspect of cybersecurity.…”
Section: Related Workmentioning
confidence: 99%
“…Traditional security defense techniques are becoming increasingly difficult to meet the new security defense requirements because of the continuous development and evolution of attack techniques. Traditional security defenses can be bypassed by attackers using a variety of techniques, including new vulnerabilities, malware, and other means [7][8][9].…”
Section: Introductionmentioning
confidence: 99%