Advanced Persistent Threats and its role in Network Security Vulnerabilities
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Abomhara, M. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Arsene, L. (2017). The Anatomy of Advanced Persistent Threats [Online]. USA: Dark Reading, UBM LLC Available: http://ubm.io/1xfLYhT [Accessed 5th August 2017].
Ask, M., Bondarenko, P., Rekdal, J. E., Nordbo, A. and Ruthven, P. (2013). Advanced Persistent Threat (Apt) Beyond the Hype. Project Report in IMT4582 Network Security at GjoviN University College.
Bodmer, S., Kilger, M., Carpenter, G. and Jones, J. (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw Hill Professional.
Brewer, R. (2014). Advanced Persistent Threats: Minimising the Damage. Network Security, 2014(4), 5-9.
Byres, E. (2008). Defense in Depth. Control Engineering Asia June 2008.
Choi, J., Choi, C., Lynn, H. M. and Kim, P. (2015) Published. Ontology Based Apt Attack Behavior Analysis in Cloud Computing. Broadband and Wireless Computing, Communication and Applications (BWCCA), 2015 10th International Conference on, 2015. IEEE, 375-379.
Choo, K.-K. R. (2007). Zombies and Botnets. Trends & Issues in Crime & Criminal Justice, (333).
Cobb, M. (2013). Advanced Persistent Threats: The New Reality [Online]. USA: Venafi Next. Available: http://bit.ly/2vrUuxZ [Accessed 6th August, 2017].
Command Five. (2012). Command and Control in the Fifth Domain [Online]. Germany: Command Five Pty Ltd. [Accessed 7th August, 2017].
Crossler, R. E., Bélanger, F. and Ormond, D. (2017). The Quest for Complete Security: An Empirical Analysis of Users’ Multi-Layered Protection from Security Threats. Information Systems Frontiers, 1-15.
Dean, G., Bell, P. and Newman, J. (2012). The Dark Side of Social Media: Review of Online Terrorism. Pakistan Journal of Criminology, 3(3), 103-122.
Dimaggio, J. (2016). The Black Vine Cyber-Espionage Group [Online]. USA: Symantec Security. Available: http://symc.ly/1D9K59m [Accessed 11 August, 2017].
Fire Eye. (2017). Advanced Persistent Threat Groups [Online]. USA: FireEye CyberSecurity. Available: http://bit.ly/2wNPn8t [Accessed 11th August, 2017].
Friedberg, I., Skopik, F., Settanni, G. and Fiedler, R. (2015). Combating Advanced Persistent Threats: From Network Event Correlation to Incident Detection. Computers & Security, 48, 35-57.
GitHub. (2017). Aptnotes [Online]. USA: GiTHub Inc. Available: http://bit.ly/1zL88YN [Accessed 11th August, 2017].
Industrial Control Systems. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid [Online]. Washington DC, USA: Electricity Information Sharing and Analysis Centre (E-ISAC). Available