Network analyzer - a method for detecting advanced persistent threat

By: Material type: TextTextSubject(s): Dissertation note: Master of Science in Computer Science and Information security 2013-2015 EXT " IIT, Madras " Summary: Advanced Persistent Threat – Detection and Prevention is a project which spans around information security perspective in a web application scenario. A recent class of threats, known as Advanced Persistent Threats (APTs), has drawn increasing attention from researchers, primarily from the industrial security sector. APTs are cyber-attacks execute by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the specificity of these threats and as such an objective approach to the APT issue is lacking. In this paper, we present the results of a comprehensive study on APT, characterizing its distinguishing characteristics and attack model, and analyzing techniques commonly seen in APT attacks. We also enumerate some non-conventional countermeasures that can help to mitigate APTs, hereby highlighting the directions for future research.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Project Reports Project Reports Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre Not for loan R-718

Master of Science in Computer Science and Information security 2013-2015 EXT Sabu M Thampi Anil Prabhakar (Professor) " IIT, Madras "

Advanced Persistent Threat – Detection and Prevention is a project which spans around information security perspective in a web application scenario. A recent class of threats, known as Advanced Persistent Threats (APTs), has drawn increasing attention from researchers, primarily from the industrial security sector. APTs are cyber-attacks execute by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the specificity of these threats and as such an objective approach to the APT issue is lacking. In this paper, we present the results of a comprehensive study on APT, characterizing its distinguishing characteristics and attack model, and analyzing techniques commonly seen in APT attacks. We also enumerate some non-conventional countermeasures that can help to mitigate APTs, hereby highlighting the directions for future research.

There are no comments on this title.

to post a comment.