"Ontology Based APT Attack Behavior Analysis in Cloud Computing"
Title | "Ontology Based APT Attack Behavior Analysis in Cloud Computing" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | J. Choi, C. Choi, H. M. Lynn, P. Kim |
Conference Name | 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) |
Date Published | Nov |
Publisher | IEEE |
ISBN Number | 978-1-4673-8315-8 |
Accession Number | 15836482 |
Keywords | advanced persistent threat, APT attack, APT attack detection techniques, cloud computing, Communication system security, Computers, confidential information leakage, economic damage, hacking techniques, Inference Rules, Intrusion detection, malicious attack behavior, malicious code, Malware, Ontologies, ontologies (artificial intelligence), Ontology, ontology based APT attack behavior analysis, Organizations, personal information, pubcrawl170101, security of data, zero-day vulnerability |
Abstract | Recently personal information due to the APT attack, the economic damage and leakage of confidential information is a serious social problem, a great deal of research has been done to solve this problem. APT attacks are threatening traditional hacking techniques as well as to increase the success rate of attacks using sophisticated attack techniques such attacks Zero-Day vulnerability in order to avoid detection techniques and state-of-the-art security because it uses a combination of intelligence. In this paper, the malicious code is designed to detect APT attack based on APT attack behavior ontology that occur during the operation on the target system, it uses intelligent APT attack than to define inference rules can be inferred about malicious attack behavior to propose a method that can be detected. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7424851&isnumber=7424228 |
DOI | 10.1109/BWCCA.2015.69 |
Citation Key | 7424851 |
- malicious attack behavior
- zero-day vulnerability
- security of data
- pubcrawl170101
- personal information
- Organizations
- ontology based APT attack behavior analysis
- Ontology
- ontologies (artificial intelligence)
- Ontologies
- malware
- malicious code
- advanced persistent threat
- Intrusion Detection
- Inference Rules
- hacking techniques
- economic damage
- confidential information leakage
- Computers
- Communication system security
- Cloud Computing
- APT attack detection techniques
- APT attack