2022
DOI: 10.1177/15501329221080417
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the vulnerability in the inference phase of advanced persistent threats

Abstract: In recent years, the Internet of Things has been widely used in modern life. Advanced persistent threats are long-term network attacks on specific targets with attackers using advanced attack methods. The Internet of Things targets have also been threatened by advanced persistent threats with the widespread application of Internet of Things. The Internet of Things device such as sensors is weaker than host in security. In the field of advanced persistent threat detection, most works used machine learning metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…APT28 has used botnets both for OPSEC and C2 purposes [139], particularly when targeting IoT devices [140]. Also regarding C2, APT28 has registered domain names and rented VPS to host these domains as web infrastructure [141] [137] [142] [143] [144] [145] [146] [136].…”
Section: Apt28mentioning
confidence: 99%
“…APT28 has used botnets both for OPSEC and C2 purposes [139], particularly when targeting IoT devices [140]. Also regarding C2, APT28 has registered domain names and rented VPS to host these domains as web infrastructure [141] [137] [142] [143] [144] [145] [146] [136].…”
Section: Apt28mentioning
confidence: 99%
“…Moreover, Ref. [174] presents an algorithm for generating adversarial examples in the APT domain. The algorithm was successfully utilized to execute a gray-box attack on an APT detection model.…”
Section: Ai Techniques/algorithms Used To Detect Apts In Personal Com...mentioning
confidence: 99%
“…In the context of the rapid development of the Internet, China's network technology is gradually progressing, and various advanced servers have emerged as the times require, playing an irreplaceable role in finance, entertainment, social networking and other fields [1][2][3]. The cloud server is a new type of efficient server, which can flexibly handle computing tasks and has high overall stability.…”
Section: Introductionmentioning
confidence: 99%