DSpace logo

Please use this identifier to cite or link to this item: http://142.54.178.187:9060/xmlui/handle/123456789/826
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSIDDIQI, MURTAZA AHMED-
dc.contributor.authorMUGHERI, AZIZ-
dc.contributor.authorOAD, KANWAL-
dc.date.accessioned2019-11-04T07:15:16Z-
dc.date.available2019-11-04T07:15:16Z-
dc.date.issued2016-01-01-
dc.identifier.issn2519-5409-
dc.identifier.urihttp://142.54.178.187:9060/xmlui/handle/123456789/826-
dc.description.abstractThe evolution of internet in the age of information is very rapid. With the rapid development of the internet, significance of privacy and security is also becoming a key concern. This growing security concern is not only limited to multinational organizations and government’s high value data, but also for the mass users. During the last few years, there have been a number of network breaches with aims of espionage or sabotage, using an advanced and lethal methodology known as Advanced Persistent Threat. Keeping in view the damage done by such attacks, this paper based on literature review is intended to provide readers with intensive knowledge of an APT attack with its common phases. Later sections of the paper highlights the existing security methods currently in use or proposed by different researchers and security organizations to counter APT attacks. Statistical data on known APT attacks conducted over the last few years is also included in the paper to give the readers a clear idea of devastation caused by APT attacks. At the end of the paper conclusion and future work is emphasized, which include the crucial steps that can be employed to fight against APT attacks. Data analysed in this paper is extracted from annual reports published by well-known security implementation groups and reports released by organizations that have been targeted or victim of APT attacks.en_US
dc.language.isoen_USen_US
dc.publisherPASTICen_US
dc.subjectPASTICen_US
dc.subjectAdvance Persistent Threats (APT),en_US
dc.subjectSecurity, Interneten_US
dc.subjectHackingen_US
dc.subjectMalwareen_US
dc.titleAdvance Persistent Threat Defense Techniques: A Reviewen_US
dc.typeArticleen_US
Appears in Collections:Journals

Files in This Item:
File Description SizeFormat 
Article 5.pdf163.02 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.