A framework of APT detection based on packets analysis and host destination
So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Baghdad.
2020
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/26786/1/IJS%2060%201%202020%20215%20222.pdf http://repo.uum.edu.my/26786/ http://scbaghdad.edu.iq/eijs/index.php/eijs/issue/view/31 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
Summary: | So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated
that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and
strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be used to repel this threat based on APT activity with network traffic through packets analysis and host destination. |
---|