Recently, many Advanced Persistent Threats (APTs) have emerged. APTs persistently collect information and data on a specific target using diverse attack techniques, examine the vulnerabilities of the target, and then carry out hacking using the data and examination result. An APT is very intelligent, as it selects a clear target and carries out specific attacks, unlike traditional hacking attempts. The APT has a very precise attack type because it employs indirect attacks on the terminals of the employees working for the target, as well as direct attacks. For this reason, it is very difficult to detect and handle an APT. In this paper, the recent attack methods used by APTs are described, and the attack pattern is analyzed to propose efficient countermeasures for preventing and handling APTs. © 2012 Springer-Verlag.
CITATION STYLE
Jeun, I., Lee, Y., & Won, D. (2012). A practical study on advanced persistent threats. In Communications in Computer and Information Science (Vol. 339 CCIS, pp. 144–152). https://doi.org/10.1007/978-3-642-35264-5_21
Mendeley helps you to discover research relevant for your work.