2022
DOI: 10.1007/978-981-16-8515-6_39
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Advanced Persistent Threat Detection Using Device Behavior (SHOVEL) Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…To overcome these challenges, behavioral data science has evolved from studying theoretical and empirical issues regarding human behavior [32] to conquering the cyber world and providing a promising alternative to model device behaviors [33]. A device's behavior could be classified as normal or abnormal based on how it operates [8].…”
Section: Common Device Behavioral Sources Used For Attack Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…To overcome these challenges, behavioral data science has evolved from studying theoretical and empirical issues regarding human behavior [32] to conquering the cyber world and providing a promising alternative to model device behaviors [33]. A device's behavior could be classified as normal or abnormal based on how it operates [8].…”
Section: Common Device Behavioral Sources Used For Attack Detectionmentioning
confidence: 99%
“…It helps security analysts and system specialists to analyze the design from the attackers' perspective in order to better understand APT's TTP [191]. Fingerprinting is a collection of information about a cyberthreat that identifies the Tactic, Technique, and Procedure (TTP) utilized to perpetrate the attack [8]. These fingerprints can be handled from different sources such as mobile device resource usage (such as CPU, memory, etc.)…”
Section: To Design Attack Paths Using Threat Modeling Approachesmentioning
confidence: 99%
See 3 more Smart Citations