Abstract:
The evolution of internet in the age of information is very rapid. With the rapid
development of the internet, significance of privacy and security is also becoming a key
concern. This growing security concern is not only limited to multinational organizations and
government’s high value data, but also for the mass users. During the last few years, there
have been a number of network breaches with aims of espionage or sabotage, using an
advanced and lethal methodology known as Advanced Persistent Threat. Keeping in view the
damage done by such attacks, this paper based on literature review is intended to provide
readers with intensive knowledge of an APT attack with its common phases. Later sections of
the paper highlights the existing security methods currently in use or proposed by different
researchers and security organizations to counter APT attacks. Statistical data on known APT
attacks conducted over the last few years is also included in the paper to give the readers a
clear idea of devastation caused by APT attacks. At the end of the paper conclusion and future
work is emphasized, which include the crucial steps that can be employed to fight against APT
attacks. Data analysed in this paper is extracted from annual reports published by well-known
security implementation groups and reports released by organizations that have been targeted
or victim of APT attacks.