A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities

作者: Adel Alshamrani , Sowmya Myneni , Ankur Chowdhary , Dijiang Huang

DOI: 10.1109/COMST.2019.2891891

关键词: Computer scienceMalwareIntrusion detection systemResearch opportunitiesComputer securityMitigation methodsAdvanced persistent threatClass (computer programming)SophisticationControl (management)

摘要: … relation and fine-grained behavior analysis of users and systems within … These are rising threats to many nation entities and … an undirected graph where nodes of the graph represent the …

参考文章(79)
Reginald E. Sawilla, Xinming Ou, Identifying Critical Attack Assets in Dependency Attack Graphs european symposium on research in computer security. pp. 18- 34 ,(2008) , 10.1007/978-3-540-88313-5_2
Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda, Panorama: capturing system-wide information flow for malware detection and analysis computer and communications security. pp. 116- 127 ,(2007) , 10.1145/1315245.1315261
S. Jha, O. Sheyner, J. Wing, Two formal analyses of attack graphs ieee computer security foundations symposium. pp. 49- 63 ,(2002) , 10.1109/CSFW.2002.1021806
Andrew Clark, Kun Sun, Linda Bushnell, Radha Poovendran, A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense Lecture Notes in Computer Science. pp. 3- 21 ,(2015) , 10.1007/978-3-319-25594-1_1
Michael E. Locasto, Anil Somayaji, Saran Neti, Software diversity: security, entropy and game theory usenix conference on hot topics in security. pp. 5- 5 ,(2012)
Tai-myung Chung, Ikkyun Kim, Hyunjoo Kim, Jonghyun Kim, Behavior-based anomaly detection on big data ,(2015) , 10.4225/75/57B69D1ED938E
Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee, AD2: Anomaly detection on active directory log data for insider threat monitoring international carnahan conference on security technology. pp. 287- 292 ,(2015) , 10.1109/CCST.2015.7389698
Leslie Daigle, WHOIS Protocol Specification RFC. ,vol. 3912, pp. 1- 4 ,(2004)
Jin B. Hong, Dong Seong Kim, Assessing the Effectiveness of Moving Target Defenses Using Security Models IEEE Transactions on Dependable and Secure Computing. ,vol. 13, pp. 163- 177 ,(2016) , 10.1109/TDSC.2015.2443790
Saptarshi Debroy, Prasad Calyam, Minh Nguyen, Allen Stage, Vladimir Georgiev, Frequency-minimal moving target defense using software-defined networking 2016 International Conference on Computing, Networking and Communications (ICNC). pp. 1- 6 ,(2016) , 10.1109/ICCNC.2016.7440635