A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities

复杂度 计算机科学 计算机安全 恶意软件 耐心 班级(哲学) 互联网隐私 人工智能 神学 社会科学 哲学 社会学
作者
Adel Alshamrani,Sowmya Myneni,Ankur Chowdhary,Dijiang Huang
出处
期刊:IEEE Communications Surveys and Tutorials [Institute of Electrical and Electronics Engineers]
卷期号:21 (2): 1851-1877 被引量:373
标识
DOI:10.1109/comst.2019.2891891
摘要

Threats that have been primarily targeting nation states and their associated entities have expanded the target zone to include the private and corporate sectors. This class of threats, well known as advanced persistent threats (APTs), are those that every nation and well-established organization fears and wants to protect itself against. While nation-sponsored APT attacks will always be marked by their sophistication, APT attacks that have become prominent in corporate sectors do not make it any less challenging for the organizations. The rate at which the attack tools and techniques are evolving is making any existing security measures inadequate. As defenders strive to secure every endpoint and every link within their networks, attackers are finding new ways to penetrate into their target systems. With each day bringing new forms of malware, having new signatures and behavior that is close to normal, a single threat detection system would not suffice. While it requires time and patience to perform APT, solutions that adapt to the changing behavior of APT attacker(s) are required. Several works have been published on detecting an APT attack at one or two of its stages, but very limited research exists in detecting APT as a whole from reconnaissance to cleanup, as such a solution demands complex correlation and fine-grained behavior analysis of users and systems within and across networks. Through this survey paper, we intend to bring all those methods and techniques that could be used to detect different stages of APT attacks, learning methods that need to be applied and where to make your threat detection framework smart and undecipherable for those adapting APT attackers. We also present different case studies of APT attacks, different monitoring methods, and mitigation methods to be employed for fine-grained control of security of a networked system. We conclude this paper with different challenges in defending against APT and opportunities for further research, ending with a note on what we learned during our writing of this paper.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
慕青应助qiulong采纳,获得10
1秒前
1秒前
1秒前
赘婿应助超帅怜阳采纳,获得10
2秒前
3秒前
滕皓轩发布了新的文献求助10
3秒前
SciGPT应助孤独士晋采纳,获得10
4秒前
烂漫的烙发布了新的文献求助10
4秒前
6秒前
科研通AI5应助稀饭采纳,获得10
8秒前
icecream发布了新的文献求助10
8秒前
ShiRz发布了新的文献求助10
11秒前
坦率友儿完成签到,获得积分10
12秒前
ding应助比奇堡臭鱼批发商采纳,获得10
12秒前
13秒前
浮云发布了新的文献求助30
13秒前
拿捏陕科大完成签到,获得积分10
14秒前
朴实的汉堡完成签到,获得积分10
16秒前
骐骥完成签到,获得积分10
17秒前
万能图书馆应助Zz采纳,获得10
17秒前
超帅怜阳发布了新的文献求助10
19秒前
科研通AI5应助哔哔鱼采纳,获得10
24秒前
25秒前
眼睛大智宸完成签到 ,获得积分10
25秒前
一一应助科研通管家采纳,获得10
26秒前
27秒前
所所应助科研通管家采纳,获得10
27秒前
慕青应助科研通管家采纳,获得10
27秒前
Hello应助科研通管家采纳,获得10
27秒前
bkagyin应助科研通管家采纳,获得10
27秒前
田様应助科研通管家采纳,获得10
27秒前
27秒前
科目三应助科研通管家采纳,获得10
27秒前
27秒前
27秒前
领导范儿应助科研通管家采纳,获得10
27秒前
Micro_A应助科研通管家采纳,获得10
27秒前
充电宝应助科研通管家采纳,获得10
27秒前
Ava应助科研通管家采纳,获得10
27秒前
科研通AI5应助科研通管家采纳,获得10
27秒前
高分求助中
【此为提示信息,请勿应助】请按要求发布求助,避免被关 20000
ISCN 2024 – An International System for Human Cytogenomic Nomenclature (2024) 3000
Continuum Thermodynamics and Material Modelling 2000
Encyclopedia of Geology (2nd Edition) 2000
105th Edition CRC Handbook of Chemistry and Physics 1600
Maneuvering of a Damaged Navy Combatant 650
Mindfulness and Character Strengths: A Practitioner's Guide to MBSP 380
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3776783
求助须知:如何正确求助?哪些是违规求助? 3322227
关于积分的说明 10209307
捐赠科研通 3037454
什么是DOI,文献DOI怎么找? 1666696
邀请新用户注册赠送积分活动 797627
科研通“疑难数据库(出版商)”最低求助积分说明 757976