ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS

被引:0
作者
Ghafir, Ibrahim [1 ]
Prenosil, Vaclav [1 ]
机构
[1] Masaryk Univ, Fac Informat, Botanicka 68a, Brno 60200, Czech Republic
来源
DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015' | 2015年
关键词
Cyber security; advanced persistent threat; targeted attack; spear phishing email; malware; malicious domain; malicious file hash;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent years, cyber exploitation and malicious activity are becoming increasingly sophisticated, targeted, and serious. Advanced persistent threats or APTs are a new and more sophisticated version of known multistep attack scenarios. They are targeted specifically to achieve a specific goal, most often espionage. These APTs form a problem for the current detection methods because these methods depend on known signatures of attacks and APTs make heavy use of unknown security holes for attacks. In this paper we propose two blacklist-based detection methods for detecting a spear phishing email, which is the most common technique used in APT attack. The first method is malicious domain detection method, and the second one is malicious file hash detection method. The blacklists are automatically updated each day and the detection is in the real time.
引用
收藏
页码:34 / 41
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 2012, ACM EUR WORKSH SYST
[2]  
[Anonymous], INFORM WARFARE MONIT
[3]  
Balduzzi Marco, 2013, TARGETED ATTACKS DET
[4]   The cyber threat landscape: Challenges and future research directions [J].
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2011, 30 (08) :719-731
[5]  
Dell SecureWorks, 2012, LIF ADV PERS THREAT
[6]  
Lee M., 2011, P 21 VIR B INT C OCT, P122
[7]  
Liu ST, 2013, LECT NOTES COMPUT SC, V8147, P405, DOI 10.1007/978-3-642-40820-5_34
[8]  
Mandiant Intelligence Center, 2013, TECHNICAL REPORT
[9]   Bro: a system for detecting network intruders in real-time [J].
Paxson, V .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24) :2435-2463
[10]   IT security planning under uncertainty for high-impact events [J].
Rakes, Terry R. ;
Deane, Jason K. ;
Rees, Loren Paul .
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 2012, 40 (01) :79-88