Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack

被引:64
作者
Ahmad, Atif [1 ]
Webb, Jeb [2 ]
Desouza, Kevin C. [3 ]
Boorman, James [2 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Parkville, Vic, Australia
[2] Oceania Cyber Secur Ctr, Melbourne, Vic, Australia
[3] Queensland Univ Technol, QUT Business Sch, Brisbane, Qld, Australia
基金
澳大利亚研究理事会;
关键词
Advanced persistent threat; APT; Cybersecurity; Information security management; Situation awareness theory; Strategic disinformation; SITUATION AWARENESS;
D O I
10.1016/j.cose.2019.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and potent class of security threat. APT refers to knowledgeable human attackers that are organized, highly sophisticated and motivated to achieve their objectives against a targeted organization(s) over a prolonged period. Strategically-motivated APTs or S-APTs are distinct in that they draw their objectives from the broader strategic agenda of third parties such as criminal syndicates, nation-states, and rival corporations. In this paper we review the use of the term "advanced persistent threat," and present a formal definition. We then draw on military science, the science of organized conflict, for a theoretical basis to develop a rigorous and holistic model of the stages of an APT operation which we subsequently use to explain how S-APTs execute their strategically motivated operations using tactics, techniques and procedures. Finally, we present a general disinformation model, derived from situation awareness theory, and explain how disinformation can be used to attack the situation awareness and decision making of not only S-APT operators, but also the entities that back them. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:402 / 418
页数:17
相关论文
共 120 条
  • [1] Teaching information security management: Reflections and experiences
    [J]. 1600, Emerald Group Holdings Ltd. (22):
  • [2] Protecting organizational competitive advantage: A knowledge leakage perspective
    Ahmad, Atif
    Bosua, Rachelle
    Scheepers, Rens
    [J]. COMPUTERS & SECURITY, 2014, 42 : 27 - 39
  • [3] Profiling and classifying the behavior of malicious codes
    Alazab, Mamoun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 : 91 - 102
  • [4] [Anonymous], 2016, CYBER SECURITY DECEP
  • [5] [Anonymous], 2016, GUARDIAN
  • [6] [Anonymous], 2014, SOCIAL RES METHODS Q
  • [7] [Anonymous], 2017, INT BUSINESS TIMES
  • [8] [Anonymous], 2017, ADV MICR OFF DYN DAT
  • [9] [Anonymous], 1997, FAREWELL GREATEST SP
  • [10] [Anonymous], 2017, PREEMPT UNC VULN MIC