A systematic literature review on advanced persistent threat behaviors and its detection strategy

NI Che Mat, N Jamil, Y Yusoff… - Journal of …, 2024 - academic.oup.com
Advanced persistent threats (APTs) pose significant security-related challenges to
organizations owing to their sophisticated and persistent nature, and are inimical to the …

The slogert framework for automated log knowledge graph construction

A Ekelhart, FJ Ekaputra, E Kiesling - European Semantic Web Conference, 2021 - Springer
Log files are a vital source of information for keeping systems running and healthy. However,
analyzing raw log data, ie, textual records of system events, typically involves tedious …

A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic

CD Xuan, D Duong, HX Dau - Journal of Intelligent & Fuzzy …, 2021 - content.iospress.com
Abstract Advanced Persistent Threat (APT) is a dangerous network attack method that is
widely used by attackers nowadays. During the APT attack process, attackers often use …

Knowledge mining in cybersecurity: From attack to defense

KA Akbar, SM Halim, Y Hu, A Singhal, L Khan… - IFIP Annual Conference …, 2022 - Springer
In the fast-evolving world of Cybersecurity, an analyst often has the difficult task of
responding to new threats and attack campaigns within a limited amount of time. If an …

Deephunter: A graph neural network based approach for robust cyber threat hunting

R Wei, L Cai, L Zhao, A Yu, D Meng - … 2021, Virtual Event, September 6–9 …, 2021 - Springer
Cyber Threat hunting is a proactive search for known attack behaviors in the organizational
information system. It is an important component to mitigate advanced persistent threats …

GAC: graph-based alert correlation for the detection of distributed multi-step attacks

S Haas, M Fischer - Proceedings of the 33rd Annual ACM Symposium …, 2018 - dl.acm.org
Monitoring tools like Intrusion Detection Systems (IDS), Firewalls, or Honeypots are a
second line of defense in the face of an increasing number of distributed, increasingly …

On the alert correlation process for the detection of multi-step attacks and a graph-based realization

S Haas, M Fischer - ACM SIGAPP Applied Computing Review, 2019 - dl.acm.org
Monitoring tools like Intrusion Detection Systems (IDS), Firewalls, or Honeypots are a
second line of defense in the face of an increasing number of distributed, increasingly …

Software updates strategies: A quantitative evaluation against advanced persistent threats

G Di Tizio, M Armellini… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Software updates reduce the opportunity for exploitation. However, since updates can also
introduce breaking changes, enterprises face the problem of balancing the need to secure …

Mining data provenance to detect advanced persistent threats

M Barre, A Gehani, V Yegneswaran - 11th International Workshop on …, 2019 - usenix.org
An advanced persistent threat (APT) is a stealthy malware instance that gains unauthorized
access to a system and remains undetected for an extended time period. The aim of this …

Attack scenario reconstruction via fusing heterogeneous threat intelligence

X Zang, J Gong, X Zhang, G Li - Computers & Security, 2023 - Elsevier
Nowadays, new-generation threats often use multiple means or perform several steps to
intrude into networks and ultimately reach their objective. These new threats have multi …