GHAFIR, Ibrahim a Václav PŘENOSIL. Proposed Approach for Targeted Attacks Detection. In Sulaiman, H.A., Othman, M.A., Othman, M.F.I., Rahim, Y.A., Pee, N.C. Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering. Phuket: Springer International Publishing, 2016, s. 73-80. ISBN 978-3-319-24582-9. Dostupné z: https://dx.doi.org/10.1007/978-3-319-24584-3_7. |
Další formáty:
BibTeX
LaTeX
RIS
@inproceedings{1318572, author = {Ghafir, Ibrahim and Přenosil, Václav}, address = {Phuket}, booktitle = {Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering}, doi = {http://dx.doi.org/10.1007/978-3-319-24584-3_7}, editor = {Sulaiman, H.A., Othman, M.A., Othman, M.F.I., Rahim, Y.A., Pee, N.C.}, keywords = {Cyber attacks; targeted attacks; advanced persistent threat; malware; intrusion detection system.}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Phuket}, isbn = {978-3-319-24582-9}, pages = {73-80}, publisher = {Springer International Publishing}, title = {Proposed Approach for Targeted Attacks Detection}, url = {http://link.springer.com/chapter/10.1007%2F978-3-319-24584-3_7}, year = {2016} }
TY - JOUR ID - 1318572 AU - Ghafir, Ibrahim - Přenosil, Václav PY - 2016 TI - Proposed Approach for Targeted Attacks Detection PB - Springer International Publishing CY - Phuket SN - 9783319245829 KW - Cyber attacks KW - targeted attacks KW - advanced persistent threat KW - malware KW - intrusion detection system. UR - http://link.springer.com/chapter/10.1007%2F978-3-319-24584-3_7 L2 - http://link.springer.com/chapter/10.1007%2F978-3-319-24584-3_7 N2 - For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise Internet infrastructure. Targeted attack or advanced persistent threat (APT) attack is a new challenge and aims to accomplish a specific goal, most often espionage. APTs are presently the biggest threat to governments and organizations. This paper states research questions and propose a novel approach to intrusion detection system processes network traffic and able to detect potential APT attack. This detection of APT attack is based on the correlation between the events which we get as outputs of our detection methods. Each detection method aims to detect one technique used in one of APT attack steps. ER -
GHAFIR, Ibrahim a Václav PŘENOSIL. Proposed Approach for Targeted Attacks Detection. In Sulaiman, H.A., Othman, M.A., Othman, M.F.I., Rahim, Y.A., Pee, N.C. \textit{Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering}. Phuket: Springer International Publishing, 2016, s.~73-80. ISBN~978-3-319-24582-9. Dostupné z: https://dx.doi.org/10.1007/978-3-319-24584-3\_{}7.
|