Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Title | Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Bhatnagar, Dev, Som, Subhranil, Khatri, Sunil Kumar |
Conference Name | 2019 Amity International Conference on Artificial Intelligence (AICAI) |
Date Published | Feb. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-9346-9 |
Keywords | advance persistant threat, Advance Persistent Threat, advanced persistent threat, attack vectors, big organizations, big picture, Clearing Tracks, Computer crime, cyber spying, Foot-printing, HPING3 Metasploit-Framework, Kali Linux, Malware, Measurement, Meterpreter, Metrics, Organizations, primary security concerns, privacy, pubcrawl, Reconnaissance, skilled cybercriminal, Testing, threat vectors, Tools, Traceroute, Vectors, Wireshark |
Abstract | Advance persistent threat is a primary security concerns to the big organizations and its technical infrastructure, from cyber criminals seeking personal and financial information to state sponsored attacks designed to disrupt, compromising infrastructure, sidestepping security efforts thus causing serious damage to organizations. A skilled cybercriminal using multiple attack vectors and entry points navigates around the defenses, evading IDS/Firewall detection and breaching the network in no time. To understand the big picture, this paper analyses an approach to advanced persistent threat by doing the same things the bad guys do on a network setup. We will walk through various steps from foot-printing and reconnaissance, scanning networks, gaining access, maintaining access to finally clearing tracks, as in a real world attack. We will walk through different attack tools and exploits used in each phase and comparative study on their effectiveness, along with explaining their attack vectors and its countermeasures. We will conclude the paper by explaining the factors which actually qualify to be an Advance Persistent Threat. |
URL | https://ieeexplore.ieee.org/document/8701329 |
DOI | 10.1109/AICAI.2019.8701329 |
Citation Key | bhatnagar_advance_2019 |
- Meterpreter
- Wireshark
- Vectors
- Traceroute
- tools
- threat vectors
- testing
- skilled cybercriminal
- Reconnaissance
- pubcrawl
- privacy
- primary security concerns
- Organizations
- Metrics
- advance persistant threat
- Measurement
- malware
- Kali Linux
- HPING3 Metasploit-Framework
- Foot-printing
- cyber spying
- Computer crime
- Clearing Tracks
- big picture
- big organizations
- Attack vectors
- advanced persistent threat
- Advance Persistent Threat