PASTIC Dspace Repository

Advance Persistent Threat Defense Techniques: A Review

Show simple item record

dc.contributor.author SIDDIQI, MURTAZA AHMED
dc.contributor.author MUGHERI, AZIZ
dc.contributor.author OAD, KANWAL
dc.date.accessioned 2019-11-04T07:15:16Z
dc.date.available 2019-11-04T07:15:16Z
dc.date.issued 2016-01-01
dc.identifier.issn 2519-5409
dc.identifier.uri http://142.54.178.187:9060/xmlui/handle/123456789/826
dc.description.abstract The evolution of internet in the age of information is very rapid. With the rapid development of the internet, significance of privacy and security is also becoming a key concern. This growing security concern is not only limited to multinational organizations and government’s high value data, but also for the mass users. During the last few years, there have been a number of network breaches with aims of espionage or sabotage, using an advanced and lethal methodology known as Advanced Persistent Threat. Keeping in view the damage done by such attacks, this paper based on literature review is intended to provide readers with intensive knowledge of an APT attack with its common phases. Later sections of the paper highlights the existing security methods currently in use or proposed by different researchers and security organizations to counter APT attacks. Statistical data on known APT attacks conducted over the last few years is also included in the paper to give the readers a clear idea of devastation caused by APT attacks. At the end of the paper conclusion and future work is emphasized, which include the crucial steps that can be employed to fight against APT attacks. Data analysed in this paper is extracted from annual reports published by well-known security implementation groups and reports released by organizations that have been targeted or victim of APT attacks. en_US
dc.language.iso en_US en_US
dc.publisher PASTIC en_US
dc.subject PASTIC en_US
dc.subject Advance Persistent Threats (APT), en_US
dc.subject Security, Internet en_US
dc.subject Hacking en_US
dc.subject Malware en_US
dc.title Advance Persistent Threat Defense Techniques: A Review en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account