Schemes for Surviving Advanced Persistent Threats
نویسندگان
چکیده
Mission critical systems are prevalent in the military and industry which renders them attractive as targets for security attacks. Their constantly increasing structural complexity contributes to benign faults and further facilitates malicious entities. Over the years, these malicious entities in cyber-space have grown smarter and extremely resourceful. Advanced persistent threat (APT) is a clear example of this growing sophistication. APTs are characterized by extreme stealth, advanced skill-set, vast resources and a markedly high success rate. In view of these circumstances, mission survivability has become an essential necessity for today’s mission critical systems. Most existing survivability solutions are simple combinations of traditional security measures such as network monitoring, firewalls, etc. These solutions increase the cost of attacks but do not necessarily decrease the probability of a compromise substantially. This calls for further advancement of current mission survivability solutions. The focus of this dissertation is the robust designing and efficient deployment of an effective mission survivability solution. Such a solution must be capable of withstanding APT, one of the hardest threats encountered in recent times. The solution presented for this purpose relies upon the understanding of attacker intent,
منابع مشابه
Methodology for Detecting Advanced Persistent Threats in Oracle Databases
Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that...
متن کاملTowards an Operational Semantic Theory of Cyber Defense Against Advanced Persistent Threats
This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence, knowledge engineering, and machine learning. After introducing advanced persistent threats, it overviews a systematic APT detection framework and the corresponding APT detection models, the fo...
متن کاملThreat Analysis and Defense Strategies for Smb, Mid-size, and Enterprise Organizations
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Overview of APTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
متن کاملDefending Against Advanced Persistent Threats Using Game-Theory
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013