A practical study on advanced persistent threats

44Citations
Citations of this article
56Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, many Advanced Persistent Threats (APTs) have emerged. APTs persistently collect information and data on a specific target using diverse attack techniques, examine the vulnerabilities of the target, and then carry out hacking using the data and examination result. An APT is very intelligent, as it selects a clear target and carries out specific attacks, unlike traditional hacking attempts. The APT has a very precise attack type because it employs indirect attacks on the terminals of the employees working for the target, as well as direct attacks. For this reason, it is very difficult to detect and handle an APT. In this paper, the recent attack methods used by APTs are described, and the attack pattern is analyzed to propose efficient countermeasures for preventing and handling APTs. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Jeun, I., Lee, Y., & Won, D. (2012). A practical study on advanced persistent threats. In Communications in Computer and Information Science (Vol. 339 CCIS, pp. 144–152). https://doi.org/10.1007/978-3-642-35264-5_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free