Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects


Advanced Persistent Threats (APT)



Download 274,58 Kb.
Pdf ko'rish
bet8/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   4   5   6   7   8   9   10   11   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

2.1 Advanced Persistent Threats (APT): 
The term 
Advanced Persistent Threat was coined in 2005 by 
an USAF security analyst [9]. According to the US 
National Institute of Standards and Technology 
(NIST), an APT is an adversary that possesses 
sophisticated levels of expertise and significant 
resources to create opportunities to achieve its 
objectives using multiple attack vectors. It pursues 
objectives over an extended period of time; adapts 
to efforts of the defenders and maintains an 
adequate level of interaction aligned with its 
objectives. The attack cycle encircles target 
selection, target research, target penetration, 
command and control, target discovery, data 
exfiltration, 
intelligence 
dissemination 
and 
information exploitation. 
2.2 Arbitrary/remote code execution
:
Attackers use 
techniques to install malware remotely in order to 
take partial or complete control of a system.
2.3 ARP poisoning
:
Address Resolution Protocol 
poisoning misleads interconnection devices about 
the real MAC of a machine. ARP contains only two 
types of messages: ARP request and ARP reply. 
Attackers create ARP reply packets using spoofed 
MAC addresses to poison ARP cache on any 
network system. VLAN segregation prevents this 
type of attack. 
2.4 Bluejacking
:
It is the process of sending text 
messages using a private Bluetooth device without 
the owner‘s consent. In addition to text messaging, 
some Bluetooth devices can include sound. The 
best security strategy is to operate the device in a 
non-discovery mode. 
2.5 Bluesnarfing
:
Unauthorized access to a 
Bluetooth device or data theft from any Bluetooth 
connection. This attack will take place as long the 
device is on and set to discovery mode. Linux users 
can launch this type of attack using hcitool and 
ObexFTP tools. 

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish