Loading [a11y]/accessibility-menu.js
Advanced persistent threats: Behind the scenes | IEEE Conference Publication | IEEE Xplore

Advanced persistent threats: Behind the scenes


Abstract:

Advanced persistent threats (APTs) pose a significant risk to nearly every infrastructure. Due to the sophistication of these attacks, they are able to bypass existing se...Show More

Abstract:

Advanced persistent threats (APTs) pose a significant risk to nearly every infrastructure. Due to the sophistication of these attacks, they are able to bypass existing security systems and largely infiltrate the target network. The prevention and detection of APT campaigns is also challenging, because of the fact that the attackers constantly change and evolve their advanced techniques and methods to stay undetected. In this paper we analyze 22 different APT reports and give an overview of the used techniques and methods. The analysis is focused on the three main phases of APT campaigns that allow to identify the relevant characteristics of such attacks. For each phase we describe the most commonly used techniques and methods. Through this analysis we could reveal different relevant characteristics of APT campaigns, for example that the usage of 0-day exploit is not common for APT attacks. Furthermore, the analysis shows that the dumping of credentials is a relevant step in the lateral movement phase for most APT campaigns. Based on the identified characteristics, we also propose concrete prevention and detection approaches that make it possible to identify crucial malicious activities that are performed during APT campaigns.
Date of Conference: 16-18 March 2016
Date Added to IEEE Xplore: 28 April 2016
ISBN Information:
Conference Location: Princeton, NJ, USA

Contact IEEE to Subscribe

References

References is not available for this document.