[HTML][HTML] Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

[HTML][HTML] On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from sysmon logs

C Smiliotopoulos, G Kambourakis… - International Journal of …, 2023 - Springer
Lateral movement (LM) is a principal, increasingly common, tactic in the arsenal of
advanced persistent threat (APT) groups and other less or more powerful threat actors. It …

[HTML][HTML] A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model

DT Salim, MM Singh, P Keikhosrokiani - Heliyon, 2023 - cell.com
Advancements in computing technology and the growing number of devices (eg, computers,
mobile) connected to networks have contributed to an increase in the amount of data …

[HTML][HTML] Detecting lateral movement: A systematic survey

C Smiliotopoulos, G Kambourakis, C Kolias - Heliyon, 2024 - cell.com
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is
defined as any activity that allows adversaries to progressively move deeper into a system in …

HetGLM: Lateral movement detection by discovering anomalous links with heterogeneous graph neural network

X Sun, J Yang - 2022 IEEE International Performance …, 2022 - ieeexplore.ieee.org
As a critical stage in the Advanced Persistent Threat (APT) lifecycle, lateral movement (LM)
has become a major concern in cybersecurity due to its stealthy nature. Recent …

A novel intelligent cognitive computing-based APT malware detection for Endpoint systems

CD Xuan, DT Huong, T Nguyen - Journal of Intelligent & Fuzzy …, 2022 - content.iospress.com
Abstract Detecting and warning Advanced Persistent Threat (APT) malware in Endpoint is
essential because the current trend of APT attacker groups is to find ways to spread malware …

[HTML][HTML] Analysing potential data security losses in organisations based on subsequent users logins

B Aziz - Plos one, 2023 - journals.plos.org
Multi-user computer environments pose potential threats to users data in organisations, in
that unauthorised subsequent users who log on to the same computer could leak, alter or …

Surgical immunization strategies against lateral movement in Active Directory environments

D Herranz-Oliveros, I Marsa-Maestre… - Journal of Network and …, 2024 - Elsevier
Lateral movement, in which a cyber attacker progresses through an enterprise network in
order to compromise its most valuable assets, is a key stage of any intrusion nowadays …

Mescal: Malicious login detection based on heterogeneous graph embedding with supervised contrastive learning

W Huang, Y Zong, Z Shi, P Liu - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Malicious logins via stolen credentials have become a primary threat in cybersecurity due to
their stealthy nature. Recent malicious login detection methods based on graph learning …