A study on advanced persistent threats

232Citations
Citations of this article
228Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A recent class of threats, known as Advanced Persistent Threats (APTs), has drawn increasing attention from researchers, primarily from the industrial security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the specificity of these threats and as such an objective approach to the APT issue is lacking. In this paper, we present the results of a comprehensive study on APT, characterizing its distinguishing characteristics and attack model, and analyzing techniques commonly seen in APT attacks. We also enumerate some non-conventional countermeasures that can help to mitigate APTs, hereby highlighting the directions for future research. © 2014 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8735 LNCS, pp. 63–72). Springer Verlag. https://doi.org/10.1007/978-3-662-44885-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free