A systematic literature review on advanced persistent threat behaviors and its detection strategy

Author:

Che Mat Nur Ilzam1ORCID,Jamil Norziana21,Yusoff Yunus1,Mat Kiah Miss Laiha3

Affiliation:

1. Institute of Informatics and Computing in Energy (IICE) and College of Computing and Informatics, University Tenaga Nasional , 43000 Kajang , Malaysia

2. College of IT, United Arab Emirates University , P.O. Box 15551, Al Ain, Abu Dhabi , UAE

3. Faculty of Computer Science and Information Technology, University of Malaya , 50603 Kuala Lumpur , Malaysia

Abstract

Abstract Advanced persistent threats (APTs) pose significant security-related challenges to organizations owing to their sophisticated and persistent nature, and are inimical to the confidentiality, integrity, and availability of organizational information and services. This study systematically reviews the literature on methods of detecting APTs by comprehensively surveying research in the area, identifying gaps in the relevant studies, and proposing directions for future work. The authors provide a detailed analysis of current methods of APT detection that are based on multi-stage attack-related behaviors. We adhered to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines and conducted an extensive search of a variety of databases. A total of 45 studies, encompassing sources from both academia and the industry, were considered in the final analysis. The findings reveal that APTs have the capability to laterally propagate and achieve their objectives by identifying and exploiting existing systemic vulnerabilities. By identifying shortcomings in prevalent methods of APT detection, we propose integrating the multi-stage attack-related behaviors of APTs with the assessment of the presence of vulnerabilities in the network and their susceptibility to being exploited in order to improve the accuracy of their identification. Such an improved approach uses vulnerability scores and probability metrics to determine the probable sequence of targeted nodes, and visualizes the path of APT attacks. This technique of advanced detection enables the early identification of the most likely targets, which, in turn, allows for the implementation of proactive measures to prevent the network from being further compromised. The research here contributes to the literature by highlighting the importance of integrating multi-stage attack-related behaviors, vulnerability assessment, and techniques of visualization for APT detection to enhance the overall security of organizations.

Funder

UAEU

Ministry of Higher Education, Malaysia

Publisher

Oxford University Press (OUP)

Reference67 articles.

1. A novel search engine to uncover potential victims for APT investigations;Te Liu,2013

2. Expert knowledge and data analysis for detecting advanced persistent threats;Moya;Open Math,2017

3. A study on advanced persistent threat;Cinar,2018

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A novel approach for predicting the spread of APT malware in the network;Applied Intelligence;2024-09-11

2. A Detection Android Cybercrime Model utilizing Machine Learning Technology;Engineering, Technology & Applied Science Research;2024-08-02

3. Security Considerations in Generative AI for Web Applications;Advances in Information Security, Privacy, and Ethics;2024-07-26

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3