Systematic mapping of detection techniques for advanced persistent threats

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Between the most complex security issues faced by private companies and public entities are Advanced Persistent Threats. These threats use multiple techniques and processes to carry out an attack on a specific entity. The need to combat cyber-attacks has driven the evolution of the Intrusion Detection System, usually by using Machine Learning technology. However, detecting an Advanced Persistent Threat is a very complex process due to the nature of the attack. The aim of this article is to conduct a systematic review of the literature to establish which classification algorithms and data sets offer better results when detecting anomalous traffic that could be caused by an Advanced Persistent Threat attack. The results obtained reflect that the most used dataset is UNSW-NB15 while the algorithms that offer the best precision are K-Nearest Neighbours and Decision Trees. Moreover, the most used tool for applying Machine Learning techniques is WEKA.

Cite

CITATION STYLE

APA

Sobrín-Hidalgo, D., Campazas Vega, A., Guerrero Higueras, Á. M., Rodríguez Lera, F. J., & Fernández-Llamas, C. (2021). Systematic mapping of detection techniques for advanced persistent threats. In Advances in Intelligent Systems and Computing (Vol. 1267 AISC, pp. 426–435). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-57805-3_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free