Další formáty:
BibTeX
LaTeX
RIS
@inproceedings{1305288, author = {Ghafir, Ibrahim and Přenosil, Václav}, address = {Brno, Czech Republic}, booktitle = {Proceedings of International Conference Distance Learning, Simulation and Communication}, edition = {první vydání}, editor = {Miroslav Hrubý}, keywords = {Cyber security; advanced persistent threat; targeted attack; spear phishing email; malware; malicious domain; malicious file hash}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Brno, Czech Republic}, isbn = {978-80-7231-992-3}, pages = {34-41}, publisher = {University of Defence}, title = {Advanced Persistent Threat and Spear Phishing Emails}, url = {http://dlsc.unob.cz/data/Proceedings%20of%20the%20DLSC%202015%20conference.pdf}, year = {2015} }
TY - JOUR ID - 1305288 AU - Ghafir, Ibrahim - Přenosil, Václav PY - 2015 TI - Advanced Persistent Threat and Spear Phishing Emails PB - University of Defence CY - Brno, Czech Republic SN - 9788072319923 KW - Cyber security KW - advanced persistent threat KW - targeted attack KW - spear phishing email KW - malware KW - malicious domain KW - malicious file hash UR - http://dlsc.unob.cz/data/Proceedings%20of%20the%20DLSC%202015%20conference.pdf L2 - http://dlsc.unob.cz/data/Proceedings%20of%20the%20DLSC%202015%20conference.pdf N2 - In recent years, cyber exploitation and malicious activity are becoming increasingly sophisticated, targeted, and serious. Advanced persistent threats or APTs are a new and more sophisticated version of known multistep attack scenarios. They are targeted specifically to achieve a specific goal, most often espionage. These APTs form a problem for the current detection methods because these methods depend on known signatures of attacks and APTs make heavy use of unknown security holes for attacks. In this paper we propose two blacklist-based detection methods for detecting a spear phishing email, which is the most common technique used in APT attack. The first method is malicious domain detection method, and the second one is malicious file hash detection method. The blacklists are automatically updated each day and the detection is in the real time. ER -
GHAFIR, Ibrahim a Václav PŘENOSIL. Advanced Persistent Threat and Spear Phishing Emails. In Miroslav Hrubý. \textit{Proceedings of International Conference Distance Learning, Simulation and Communication}. první vydání. Brno, Czech Republic: University of Defence, 2015, s.~34-41. ISBN~978-80-7231-992-3.
|