Apărarea împotriva atacurilor cibernetice avansate

Sfetcu, Nicolae Apărarea împotriva atacurilor cibernetice avansate. Cuoașterea Științifică, 2024, vol. 3, n. 1, pp. 3-16. [Journal article (Paginated)]

[thumbnail of Cunoasterea_Stiintifica-3-1-Editorial-Apararea_impotriva_atacurilor_cibernetice_avansate-Nicolae_Sfetcu.pdf]
Preview
Text
Cunoasterea_Stiintifica-3-1-Editorial-Apararea_impotriva_atacurilor_cibernetice_avansate-Nicolae_Sfetcu.pdf

Download (366kB) | Preview

English abstract

In today’s digitally interconnected world, the threat of cyberattacks has become a critical concern for individuals, businesses, and governments alike. Cyberattacks pose a significant risk to data privacy, financial stability, national security, and even personal safety. As the sophistication and frequency of cyberthreats continue to increase, it is imperative that we implement robust defenses to protect our digital assets and infrastructure. Traditional security technology and methods are ineffective in detecting or mitigating cyberattacks. This essay explores various strategies and measures to defend against cyberattacks.

Romanian abstract

În lumea de astăzi interconectată digital, amenințarea atacurilor cibernetice a devenit o preocupare esențială pentru indivizi, companii și guverne deopotrivă. Atacurile cibernetice reprezintă un risc semnificativ pentru confidențialitatea datelor, stabilitatea financiară, securitatea națională și chiar siguranța personală. Pe măsură ce sofisticarea și frecvența amenințărilor cibernetice continuă să crească, este imperativ să implementăm sisteme de apărare robuste pentru a ne proteja activele și infrastructura digitale. Tehnologia și metodele tradiționale de securitate sunt ineficiente în detectarea sau atenuarea atacurilor cibernetice. Acest eseu explorează diverse strategii și măsuri de apărare împotriva atacurilor cibernetice.

Item type: Journal article (Paginated)
Keywords: atacuri cibernetice, amenințarea persistentă avansată, malware, exploit, detectarea atacurilor, apărare, protecție
Subjects: L. Information technology and library technology > LH. Computer and network security.
Depositing user: Nicolae Sfetcu
Date deposited: 06 Oct 2025 08:20
Last modified: 06 Oct 2025 08:20
URI: http://hdl.handle.net/10760/47173

References

Adelaiye, Oluwasegun, Aminat Ajibola, and Faki Silas. 2019. “Evaluating Advanced Persistent Threats Mitigation Effects: A Review,” February.

Alshamrani, Adel, Sowmya Myneni, Ankur Chowdhary, and Dijiang Huang. 2019. “A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities.” IEEE Communications Surveys & Tutorials 21 (2): 1851–77. https://doi.org/10.1109/COMST.2019.2891891.

Arachchilage, Nalin, and Steve Love. 2014. “Security Awareness of Computer Users: A Phishing Threat Avoidance Perspective.” Computers in Human Behavior 38 (September): 304–12. https://doi.org/10.1016/j.chb.2014.05.046.

Ashford, Warwick. 2011. “How to Combat Advanced Persistent Threats: APT Strategies to Protect Your Organisation | Computer Weekly.” ComputerWeekly.Com. 2011. https://www.computerweekly.com/feature/How-to-combat-advanced-persistent-threats-APT-strategies-to-protect-your-organisation.

Bere, Mercy, Fungai Bhunu Shava, Attlee Gamundani, and Isaac Nhamu. 2015. “How Advanced Persistent Threats Exploit Humans.” IJCSI, November.

Bowen, Brian M., Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. 2009. “Baiting Inside Attackers Using Decoy Documents.” In Security and Privacy in Communication Networks, edited by Yan Chen, Tassos D. Dimitriou, and Jianying Zhou, 51–70. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-05284-2_4.

Bulgurcu, Burcu, Hasan Cavusoglu, and Izak Benbasat. 2010. “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness.” MIS Quarterly 34 (3): 523–48. https://doi.org/10.2307/25750690.

Chen, Ping, Lieven Desmet, and Christophe Huygens. 2014. “A Study on Advanced Persistent Threats.” In Communications and Multimedia Security, edited by Bart De Decker and André Zúquete, 63–72. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-662-44885-4_5.

Conti, Mauro, Luigi V. Mancini, Riccardo Spolaor, and Nino Vincenzo Verde. 2015. “Can’t You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.” In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 297–304. CODASPY ’15. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/2699026.2699119.

Coppolino, L., Michael Jäger, Nicolai Kuntze, and Roland Rieke. 2012. “A Trusted Information Agent for Security Information and Event Management.” In , 6–12.

Crouse, Michael, Bryan Prosser, and Errin Fulp. 2015. Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses. https://doi.org/10.1145/2808475.2808480.

Deloitte. 2016. “Cyber Espionage – The Harsh Reality of Advanced Security Threats.” https://indianstrategicknowledgeonline.com/web/us_aers_cyber_espionage_07292011.pdf.

Edwards, Benjamin, Tyler Moore, George Stelle, Steven Hofmeyr, and Stephanie Forrest. 2012. “Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions.” Proceedings New Security Paradigms Workshop, February. https://doi.org/10.1145/2413296.2413302.

García-Teodoro, Pedro, Jesús Díaz-Verdejo, Gabriel Maciá-Fernández, and Enrique Vázquez. 2009. “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges.” Computers & Security 28 (February): 18–28. https://doi.org/10.1016/j.cose.2008.08.003.

Ghafir, Ibrahim, and Vaclav Prenosil. 2016. “Proposed Approach for Targeted Attacks Detection.” In Advanced Computer and Communication Engineering Technology, edited by Hamzah Asyrani Sulaiman, Mohd Azlishah Othman, Mohd Fairuz Iskandar Othman, Yahaya Abd Rahim, and Naim Che Pee, 73–80. Lecture Notes in Electrical Engineering. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-24584-3_7.

Giura, P., and Wei Wang. 2012. “Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats.” Science. https://www.semanticscholar.org/paper/Using-Large-Scale-Distributed-Computing-to-Unveil-Giura-Wang/75e702d56a4a90f9c773a0e1fd0074cbe6910ead.

Greenberg, Andy. n.d. “The Full Story of the Stunning RSA Hack Can Finally Be Told.” Wired. Accessed December 11, 2023. https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/.

Hodge, Victoria J., and Jim Austin. 2004. “A Survey of Outlier Detection Methodologies.” Artificial Intelligence Review 22 (2): 85–126. https://doi.org/10.1007/s10462-004-4304-y.

Hudson, Barbara. 2013. “Advanced Persistent Threats: Detection, Protection and Prevention.” https://i.crn.com/sites/default/files/ckfinderimages/userfiles/images/crn/custom/Sophos_Advanced_Persistent_Threats.pdf.

Huh, Jun, John Lyle, Cornelius Namiluko, and Andrew Martin. 2011. “Managing Application Whitelists in Trusted Distributed Systems.” Future Generation Comp. Syst. 27 (February): 211–26. https://doi.org/10.1016/j.future.2010.08.014.

Hutchins, Eric, Michael Cloppert, and Rohan Amin. 2011. “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains.” Leading Issues in Information Warfare & Security Research 1 (January).

ISACA. 2016. “Book Review: Advanced Persistent Threats.” ISACA. 2016. https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/advanced-persistent-threats-how-to-manage-the-risk-to-your-business.

Johnson, John, and Emilie Hogan. 2013. A Graph Analytic Metric for Mitigating Advanced Persistent Threat. Vol. 129. https://doi.org/10.1109/ISI.2013.6578801.

Kaspersky. 2015. “The Duqu 2.0.” https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07205202/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf.

Kim, Hyunjoo, Jonghyun Kim, Ikkyun Kim, and Tai-myung Chung. 2015. “Behavior-Based Anomaly Detection on Big Data.” Australian Information Security Management Conference, January. https://doi.org/10.4225/75/57b69d1ed938e.

Leonhard, Woody. 2014. “Internet Explorer ‘SnowMan’ Zero-Day Spreading: Use Alternative or Patch with KB 2934088.” InfoWorld. February 26, 2014. https://www.infoworld.com/article/2610582/internet-explorer–snowman–zero-day-spreading–use-alternative-or-patch-with-kb-293408.html.

Lo, Chi-Chun, and Wan-Jia Chen. 2012. “A Hybrid Information Security Risk Assessment Procedure Considering Interdependences between Controls.” Expert Systems with Applications 39 (1): 247–57. https://doi.org/10.1016/j.eswa.2011.07.015.

Mahadevan, Vijay, Wei-Xin LI, Viral Bhalodia, and Nuno Vasconcelos. 2010. Anomaly Detection in Crowded Scenes. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. https://doi.org/10.1109/CVPR.2010.5539872.

Marchetti, Mirco, Fabio Pierazzi, Michele Colajanni, and Alessandro Guido. 2016. “Analysis of High Volumes of Network Traffic for Advanced Persistent Threat Detection.” Computer Networks 109 (June). https://doi.org/10.1016/j.comnet.2016.05.018.

McAfee. 2010. “Protecting Your Critical Assets – Lessons Learned from ‘Operation Aurora.’” https://www.wired.com/images_blogs/threatlevel/2010/03/operationaurora_wp_0310_fnl.pdf.

Merz, Terry. 2019. “A Context-Centred Research Approach to Phishing and Operational Technology in Industrial Control Systems | Journal of Information Warfare.” 2019. https://www.jinfowar.com/journal/volume-18-issue-4/context-centred-research-approach-phishing-operational-technology-industrial-control-systems.

Messier, Ric. 2013. GSEC GIAC Security Essentials Certification All-in-One Exam Guide. McGraw Hill Professional.

Moon, Daesung, Hyungjin Im, Jae Dong Lee, and Jong Hyuk Park. 2014. “MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.” Symmetry 6 (4): 997–1010. https://doi.org/10.3390/sym6040997.

Muszyński, Józef, and Greg Shipley. 2008. “Narzędzia SIEM (Security Information and Event Management).” Computerworld. 2008. https://www.computerworld.pl/news/Narzedzia-SIEM-Security-Information-and-Event-Management,325855.html.

Nance, Kara, and Matt Bishop. 2017. Introduction to Deception, Digital Forensics, and Malware Minitrack. https://doi.org/10.24251/HICSS.2017.731.

Peikert, Chris. 2016. “A Decade of Lattice Cryptography.” Foundations and Trends® in Theoretical Computer Science 10 (4): 283–424. https://doi.org/10.1561/0400000074.

Pfleeger, Shari, Angela Sasse, and Adrian Furnham. 2014. “From Weakest Link to Security Hero: Transforming Staff Security Behavior.” Journal of Homeland Security and Emergency Management 11 (December). https://doi.org/10.1515/jhsem-2014-0035.

Rafique, M. Zubair, Ping Chen, Christophe Huygens, and Wouter Joosen. 2014. “Evolutionary Algorithms for Classification of Malware Families through Different Network Behaviors.” In Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, 1167–74. GECCO ’14. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/2576768.2598238.

Rot, Artur. 2016. “Zarządzanie Ryzykiem w Cyberprzestrzeni – Wybrane Zagadnienia Teorii i Praktyki.” In , 35–50.

Rot, Artur, and Bogusław Olszewski. 2017. Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection. https://doi.org/10.15439/2017F488.

Russell, Chelsa. 2002. “Security Awareness – Implementing an Effective Strategy | SANS Institute.” 2002. https://www.sans.org/white-papers/418/.

Schmid, M., F. Hill, and A.K. Ghosh. 2002. “Protecting Data from Malicious Software.” 18th Annual Computer Security Applications Conference, 2002. Proceedings., 199–208. https://doi.org/10.1109/CSAC.2002.1176291.

Shalaginov, Andrii, Katrin Franke, and Xiongwei Huang. 2016. Malware Beaconing Detection by Mining Large-Scale DNS Logs for Targeted Attack Identification.

Singh, Abhishek, and Zheng Bu. 2014. “Hot Knives Through Butter: Bypassing Automated Analysis Systems (Black Hat USA 2013) – InfoconDB.” 2014. https://infocondb.org/con/black-hat/black-hat-usa-2013/hot-knives-through-butter-bypassing-automated-analysis-systems.

Smart, Steven J. 2011. “Joint Targeting in Cyberspace.” https://apps.dtic.mil/sti/citations/ADA555785.

Villeneuve, Nart, James T. Bennett, Ned Moran, Thoufique Haq, Mike Scott, and Kenneth Geers. 2013. Operation „Ke3chang: Targeted Attacks Against Ministries of Foreign Affairs. FireEye, Incorporated.

Virvilis, Nikos, and Dimitris Gritzalis. 2013. “The Big Four – What We Did Wrong in Advanced Persistent Threat Detection?” In 2013 International Conference on Availability, Reliability and Security, 248–54. https://doi.org/10.1109/ARES.2013.32.

Wang, Yuan, Yongjun Wang, Jing Liu, and Zhijian Huang. 2014. “A Network Gene-Based Framework for Detecting Advanced Persistent Threats.” In 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 97–102. https://doi.org/10.1109/3PGCIC.2014.41.

Wright, John, Yi Ma, Julien Mairal, Guillermo Sapiro, Thomas S. Huang, and Shuicheng Yan. 2010. “Sparse Representation for Computer Vision and Pattern Recognition.” Proceedings of the IEEE 98 (6): 1031–44. https://doi.org/10.1109/JPROC.2010.2044470.

Yan, Xiaohuan, and J. Zhang. 2013. “A Early Detection of Cyber Security Threats Using Structured Behavior Modeling.” In . https://www.semanticscholar.org/paper/A-Early-Detection-of-Cyber-Security-Threats-using-Yan-Zhang/92b0c21afbf1941cb27e707c50e51bd76a8b1d45.

Yang, Lu Xing, Pengdeng Li, Xiaofan Yang, and Yuan Yan Tang. 2017. “Security Evaluation of the Cyber Networks under Advanced Persistent Threats.” IEEE Access 5 (8053761): 20111–23. https://doi.org/10.1109/ACCESS.2017.2757944.

Zions Bancorporation. 2012. “A Case Study In Security Big Data Analysis.” 2012. https://www.darkreading.com/cybersecurity-analytics/a-case-study-in-security-big-data-analysis.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item