作者
Brahim ID Messaoud, Karim Guennoun, Mohamed Wahbi, Mohamed Sadik
发表日期
2016/10/17
研讨会论文
2016 International conference on advanced communication systems and information security (ACOSIS)
页码范围
1-6
出版商
IEEE
简介
In a world where highly skilled actors involved in cyber-attacks are constantly increasing and where the associated underground market continues to expand, organizations should adapt their defence strategy and improve consequently their security incident management. In this paper, we give an overview of Advanced Persistent Threats (APT) attacks life cycle as defined by security experts. We introduce our own compiled life cycle model guided by attackers objectives instead of their actions. Challenges and opportunities related to the specific camouflage actions performed at the end of each APT phase of the model are highlighted. We also give an overview of new APT protection technologies and discuss their effectiveness at each one of life cycle phases.
引用总数
201720182019202020212022202318698143
学术搜索中的文章
BID Messaoud, K Guennoun, M Wahbi, M Sadik - … conference on advanced communication systems and …, 2016