Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges
Title | Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Messaoud, B. I. D., Guennoun, K., Wahbi, M., Sadik, M. |
Conference Name | 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS) |
ISBN Number | 978-1-5090-6227-0 |
Keywords | advanced persistent threat, advanced persistent threat attacks life cycle, APT, APT protection technologies, Biological system modeling, compiled life cycle model, composability, cyber-attacks, defence strategy, delays, Electronic mail, governance, Government, highly skilled actors, honeypots, life cycle phases, Market research, Monitoring, policy, policy-based governance, pubcrawl, Sandboxing, security, security experts, security of data, SIEM, Terminology, UBA, underground market |
Abstract | In a world where highly skilled actors involved in cyber-attacks are constantly increasing and where the associated underground market continues to expand, organizations should adapt their defence strategy and improve consequently their security incident management. In this paper, we give an overview of Advanced Persistent Threats (APT) attacks life cycle as defined by security experts. We introduce our own compiled life cycle model guided by attackers objectives instead of their actions. Challenges and opportunities related to the specific camouflage actions performed at the end of each APT phase of the model are highlighted. We also give an overview of new APT protection technologies and discuss their effectiveness at each one of life cycle phases. |
URL | https://ieeexplore.ieee.org/document/7843932/ |
DOI | 10.1109/ACOSIS.2016.7843932 |
Citation Key | messaoud_advanced_2016 |
- honeypots
- underground market
- UBA
- Terminology
- SIEM
- security of data
- security experts
- security
- sandboxing
- pubcrawl
- policy-based governance
- Policy
- Monitoring
- Market research
- life cycle phases
- advanced persistent threat
- highly skilled actors
- Government
- Governance
- Electronic mail
- delays
- defence strategy
- cyber-attacks
- composability
- compiled life cycle model
- Biological system modeling
- APT protection technologies
- APT
- advanced persistent threat attacks life cycle