A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane
Title | A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Nicho, M., Khan, S. N. |
Conference Name | 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) |
Publisher | IEEE |
ISBN Number | 978-953-233-095-3 |
Keywords | advanced persistent threat vectors, APT, APT decision matrix model, APT threat vector, APT vulnerabilities, Computer crime, cyber-security defensive mechanisms, Electronic mail, Email, fraudulent communication, genuine communication, invasive software, malicious APT vector, malware prevention, Metrics, Mobile handsets, multiple APT threat vector scenarios, organizational information systems, organizational user, Organizations, phishing, privacy, pubcrawl, security, Spear Phishing, Threat, threat attributes, threat vectors, user plane, Workstations |
Abstract | While advances in cyber-security defensive mechanisms have substantially prevented malware from penetrating into organizational Information Systems (IS) networks, organizational users have found themselves vulnerable to threats emanating from Advanced Persistent Threat (APT) vectors, mostly in the form of spear phishing. In this respect, the question of how an organizational user can differentiate between a genuine communication and a similar looking fraudulent communication in an email/APT threat vector remains a dilemma. Therefore, identifying and evaluating the APT vector attributes and assigning relative weights to them can assist the user to make a correct decision when confronted with a scenario that may be genuine or a malicious APT vector. In this respect, we propose an APT Decision Matrix model which can be used as a lens to build multiple APT threat vector scenarios to identify threat attributes and their weights, which can lead to systems compromise. |
URL | https://ieeexplore.ieee.org/document/8400210 |
DOI | 10.23919/MIPRO.2018.8400210 |
Citation Key | nicho_decision_2018 |
- Mobile handsets
- Workstations
- user plane
- threat vectors
- threat attributes
- threat
- Spear Phishing
- security
- pubcrawl
- privacy
- Phishing
- Organizations
- organizational user
- organizational information systems
- multiple APT threat vector scenarios
- advanced persistent threat vectors
- Metrics
- malware prevention
- malicious APT vector
- invasive software
- genuine communication
- fraudulent communication
- Electronic mail
- cyber-security defensive mechanisms
- Computer crime
- APT vulnerabilities
- APT threat vector
- APT decision matrix model
- APT