Amenințările persistente avansate

Sfetcu, Nicolae . Amenințările persistente avansate., 2024 In: UNSPECIFIED, (ed.) Amenințările persistente avansate în securitatea cibernetică – Războiul cibernetic. MultiMedia Publishing, pp. 11-14. [Book chapter]

[thumbnail of Amenintarile_persistente_avansate_in_securitatea_cibernetica–Razboiul_cibernetic-Nicolae_Sfetcu-Previzualizare-APT.pdf]
Preview
Text
Amenintarile_persistente_avansate_in_securitatea_cibernetica–Razboiul_cibernetic-Nicolae_Sfetcu-Previzualizare-APT.pdf - Published version
Available under License Creative Commons Attribution.

Download (1MB) | Preview

English abstract

A comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. Explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence and targeted nature. This book examines the origins, characteristics, and methods used by APT actors. It also explores the complexities associated with APT detection, analyzing the evolving tactics used by threat actors and the corresponding advances in detection methodologies. The book emphasizes the importance of a multifaceted approach that integrates technological innovations with proactive defense strategies to effectively identify and mitigate APT.

Romanian abstract

O analiză cuprinzătoare a Amenințărilor Persistente Avansate (Advanced Persistent Threats, APT), inclusiv caracteristicile, originile, metodele, consecințele și strategiile de apărare ale acestora, cu accent pe detectarea acestor amenințări. Se explorează conceptul de amenințări persistente avansate în contextul securității cibernetice și al războiului cibernetic. APT reprezintă una dintre cele mai insidioase și provocatoare forme de amenințări cibernetice, caracterizate prin sofisticarea, persistența și natura lor țintită. Această carte analizează originile, caracteristicile și metodele folosite de actorii APT. De asemenea, explorează complexitățile asociate cu detectarea APT, analizând tacticile evolutive folosite de actorii amenințărilor și a progreselor corespunzătoare în metodologiile de detectare. Cartea subliniază importanța abordării cu mai multe fațete, care integrează inovații tehnologice cu strategii proactive de apărare pentru a identifica în mod eficient și atenua APT.

Item type: Book chapter
Keywords: Amenințări Persistente Avansate, Advanced Persistent Threats, APT, securitate cibernetică. război cibernetic, detectarea amenințărilor
Subjects: L. Information technology and library technology > LH. Computer and network security.
Depositing user: Nicolae Sfetcu
Date deposited: 08 Oct 2024 07:53
Last modified: 08 Oct 2024 07:53
URI: http://hdl.handle.net/10760/46052

References

Adams, Chris. „Learning the lessons of WannaCry”. Computer Fraud & Security 2018, nr. 9 (ianuarie 2018): 6–9. https://doi.org/10.1016/S1361-3723(18)30084-8.

Adelaiye, Oluwasegun, Aminat Ajibola, și Faki Silas. „Evaluating Advanced Persistent Threats Mitigation Effects: A Review”, 19 februarie 2019.

Aleroud, Ahmed, și Lina Zhou. „Phishing environments, techniques, and countermeasures: A survey”. Computers & Security 68 (1 iulie 2017): 160–96. https://doi.org/10.1016/j.cose.2017.04.006

Alperovitch, Dmitri. „Revealed: Operation Shady RAT - McAfee”, 2011. https://icscsi.org/library/Documents/Cyber_Events/McAfee%20-%20Operation%20Shady%20RAT.pdf

Al-Saraireh, Jaafer, și Ala’ Masarweh. „A novel approach for detecting advanced persistent threats”. Egyptian Informatics Journal 23, nr. 4 (1 decembrie 2022): 45–55. https://doi.org/10.1016/j.eij.2022.06.005

Alshamrani, Adel, Sowmya Myneni, Ankur Chowdhary, și Dijiang Huang. „A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities”. IEEE Communications Surveys & Tutorials 21, nr. 2 (2019): 1851–77. https://doi.org/10.1109/COMST.2019.2891891

Al-Yaseen, Wathiq Laftah, Zulaiha Ali Othman, și Mohd Zakree Ahmad Nazri. „Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system”. Expert Systems with Applications 67 (1 ianuarie 2017): 296–303. https://doi.org/10.1016/j.eswa.2016.09.041

Amouri, Amar, Vishwa T. Alaparthy, și Salvatore D. Morgera. „A Machine Learning Based Intrusion Detection System for Mobile Internet of Things”. Sensors 20, nr. 2 (ianuarie 2020): 461. https://doi.org/10.3390/s20020461

Apruzzese, Giovanni, Fabio Pierazzi, Michele Colajanni, și Mirco Marchetti. „Detection and Threat Prioritization of Pivoting Attacks in Large Networks”. IEEE Transactions on Emerging Topics in Computing PP (23 octombrie 2017): 1–1. https://doi.org/10.1109/TETC.2017.2764885

Arachchilage, Nalin, și Steve Love. „Security awareness of computer users: A phishing threat avoidance perspective”. Computers in Human Behavior 38 (1 septembrie 2014): 304–12. https://doi.org/10.1016/j.chb.2014.05.046

Arntz, Pieter. „Explained: Advanced Persistent Threat (APT) | Malwarebytes Labs”. Malwarebytes, 25 iulie 2016. https://www.malwarebytes.com/blog/news/2016/07/explained-advanced-persistent-threat-apt

Ashford, Warwick. „How to Combat Advanced Persistent Threats: APT Strategies to Protect Your Organisation | Computer Weekly”. ComputerWeekly.com, 2011. https://www.computerweekly.com/feature/How-to-combat-advanced-persistent-threats-APT-strategies-to-protect-your-organisation

Ask, M. „Advanced Persistent Threat ( APT ) Beyond the hype Project report in IMT 4582 Network security at Gjøvik University College during spring 2013”, 2013. https://www.semanticscholar.org/paper/Advanced-Persistent-Threat-(-APT-)-Beyond-the-hype-Ask/a140cd962b136474685db82de60bb15f4fe1d7e1

Axelsson, Stefan. „The base-rate fallacy and the difficulty of intrusion detection”. ACM Transactions on Information and System Security 3, nr. 3 (1 august 2000): 186–205. https://doi.org/10.1145/357830.357849

Azaria, Amos, Ariella Richardson, Sarit Kraus, și V. Subrahmanian. „Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data”. IEEE Transactions on Computational Social Systems 1 (1 iunie 2014): 135–55. https://doi.org/10.1109/TCSS.2014.2377811

Bai, Tim, Haibo Bian, Abbas Abou Daya, Mohammad Salahuddin, Noura Limam, și Raouf Boutaba. A Machine Learning Approach for RDP-based Lateral Movement Detection, 2019. https://doi.org/10.1109/LCN44214.2019.8990853.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item