GHAFIR, Ibrahim and Václav PŘENOSIL. Proposed Approach for Targeted Attacks Detection. In Sulaiman, H.A., Othman, M.A., Othman, M.F.I., Rahim, Y.A., Pee, N.C. Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering. Phuket: Springer International Publishing, 2016, p. 73-80. ISBN 978-3-319-24582-9. Available from: https://dx.doi.org/10.1007/978-3-319-24584-3_7.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Proposed Approach for Targeted Attacks Detection
Name in Czech Návrh přístupu pro cílenou detekci útoků
Authors GHAFIR, Ibrahim (760 Syrian Arab Republic, guarantor, belonging to the institution) and Václav PŘENOSIL (203 Czech Republic, belonging to the institution).
Edition Phuket, Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering, p. 73-80, 8 pp. 2016.
Publisher Springer International Publishing
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Switzerland
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW URL
RIV identification code RIV/00216224:14330/16:00087688
Organization unit Faculty of Informatics
ISBN 978-3-319-24582-9
ISSN 1876-1100
Doi http://dx.doi.org/10.1007/978-3-319-24584-3_7
Keywords (in Czech) Kybernetické útoky; cílené útoky; pokročilé přetrvávající hrozby; malware; systém detekce narušení.
Keywords in English Cyber attacks; targeted attacks; advanced persistent threat; malware; intrusion detection system.
Tags International impact, Reviewed
Changed by Changed by: Ibrahim Ghafir, Ph.D., učo 417762. Changed: 12/12/2016 10:51.
Abstract
For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise Internet infrastructure. Targeted attack or advanced persistent threat (APT) attack is a new challenge and aims to accomplish a specific goal, most often espionage. APTs are presently the biggest threat to governments and organizations. This paper states research questions and propose a novel approach to intrusion detection system processes network traffic and able to detect potential APT attack. This detection of APT attack is based on the correlation between the events which we get as outputs of our detection methods. Each detection method aims to detect one technique used in one of APT attack steps.
Abstract (in Czech)
Provozovatelé a uživatelé počítačových sítí se dlouhou dobu snaží eliminovat vliv hackerů a jejich škodlivého SW na své informační systémy s různým stupněm úspěšnosti. Na druhou stranu, počítačoví zločinci vytvářejí stále důmyslnější techniky pro kompromitaci internetové infrastruktury. Cílený útok typu pokročilá trvalá hrozba (APT) je novou metodou jak ovládnout atakovanou síť. APT jsou v současnosti největší hrozbou pro státní instituce a jejich organizace. Tento článek diskutuje související teoretický otázky a navrhnuje nový přístup ke struktuře systému detekcí průniků, který zpracovává síťový provoz a schopen odhalit potenciální APT útoky. Tato detekce APT útoků je založena na korelaci mezi událostmi, které získáme jako výstupy našich detekčních metod. Každá metoda detekce si klade za cíl odhalit jednu techniku používanou v jednom z kroků APT kroku.
Links
OFMASUN201301, research and development projectName: CIRC - Mobilní dedikované zařízení pro naplňování schopností reakce na počítačové incidenty
Type Name Uploaded/Created by Uploaded/Created Rights
Proposed_Approach_for_Targeted_Attacks_Detection.pdf Licence Creative Commons  File version Přenosil, V. 5/12/2016

Properties

Address within IS
https://is.muni.cz/auth/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.pdf
Address for the users outside IS
https://is.muni.cz/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.pdf
Address within Manager
https://is.muni.cz/auth/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.pdf?info
Address within Manager for the users outside IS
https://is.muni.cz/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.pdf?info
Uploaded/Created
Mon 5/12/2016 16:57, prof. Ing. Václav Přenosil, CSc.

Rights

Right to read
  • anyone on the Internet
  • a concrete person prof. Ing. Václav Přenosil, CSc., učo 169249
  • a concrete person Ibrahim Ghafir, Ph.D., učo 417762
Right to upload
 
Right to administer:
  • a concrete person prof. Ing. Václav Přenosil, CSc., učo 169249
  • a concrete person Ibrahim Ghafir, Ph.D., učo 417762
Attributes
 

Proposed_Approach_for_Targeted_Attacks_Detection.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.pdf
Address for the users outside IS
https://is.muni.cz/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.pdf
File type
PDF (application/pdf)
Size
221,5 KB
Hash md5
ac68f33eae15b69545be7aeec2c5d3dd
Uploaded/Created
Mon 5/12/2016 16:57

Proposed_Approach_for_Targeted_Attacks_Detection.txt

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.txt
Address for the users outside IS
https://is.muni.cz/publication/1318572/Proposed_Approach_for_Targeted_Attacks_Detection.txt
File type
plain text (text/plain)
Size
19,1 KB
Hash md5
fc917d5817db6dfa92af6c81033bd683
Uploaded/Created
Mon 5/12/2016 17:03
Print
Report a file uploaded without authorization. Displayed: 4/5/2024 09:19