A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

Insomnia: Towards concept-drift robustness in network intrusion detection

G Andresini, F Pendlebury, F Pierazzi… - Proceedings of the 14th …, 2021 - dl.acm.org
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …

Machine learning based mobile malware detection using highly imbalanced network traffic

Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang… - Information …, 2018 - Elsevier
In recent years, the number and variety of malicious mobile apps have increased drastically,
especially on Android platform, which brings insurmountable challenges for malicious app …

Understanding APT detection using Machine learning algorithms: Is superior accuracy a thing?

S Arefin, M Chowdhury, R Parvez… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, the detection of Advanced Persistent Threats
(APTs) remains a formidable challenge, where conventional methods often falter in the …

A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems

L Huang, Q Zhu - Computers & Security, 2020 - Elsevier
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …

Data exfiltration: A review of external attack vectors and countermeasures

F Ullah, M Edwards, R Ramdhany, R Chitchyan… - Journal of Network and …, 2018 - Elsevier
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …

APT datasets and attack modeling for automated detection methods: A review

B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …

Early detection of the advanced persistent threat attack using performance analysis of deep learning

JH Joloudari, M Haderbadi, A Mashmool… - IEEE …, 2020 - ieeexplore.ieee.org
One of the most common and critical destructive attacks on the victim system is the
advanced persistent threat (APT)-attack. An APT attacker can achieve its hostile goal …