Visible to the public Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges

TitleAdvanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Publication TypeConference Paper
Year of Publication2016
AuthorsMessaoud, B. I. D., Guennoun, K., Wahbi, M., Sadik, M.
Conference Name2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)
ISBN Number978-1-5090-6227-0
Keywordsadvanced persistent threat, advanced persistent threat attacks life cycle, APT, APT protection technologies, Biological system modeling, compiled life cycle model, composability, cyber-attacks, defence strategy, delays, Electronic mail, governance, Government, highly skilled actors, honeypots, life cycle phases, Market research, Monitoring, policy, policy-based governance, pubcrawl, Sandboxing, security, security experts, security of data, SIEM, Terminology, UBA, underground market
Abstract

In a world where highly skilled actors involved in cyber-attacks are constantly increasing and where the associated underground market continues to expand, organizations should adapt their defence strategy and improve consequently their security incident management. In this paper, we give an overview of Advanced Persistent Threats (APT) attacks life cycle as defined by security experts. We introduce our own compiled life cycle model guided by attackers objectives instead of their actions. Challenges and opportunities related to the specific camouflage actions performed at the end of each APT phase of the model are highlighted. We also give an overview of new APT protection technologies and discuss their effectiveness at each one of life cycle phases.

URLhttps://ieeexplore.ieee.org/document/7843932/
DOI10.1109/ACOSIS.2016.7843932
Citation Keymessaoud_advanced_2016