Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack

被引:64
作者
Ahmad, Atif [1 ]
Webb, Jeb [2 ]
Desouza, Kevin C. [3 ]
Boorman, James [2 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Parkville, Vic, Australia
[2] Oceania Cyber Secur Ctr, Melbourne, Vic, Australia
[3] Queensland Univ Technol, QUT Business Sch, Brisbane, Qld, Australia
基金
澳大利亚研究理事会;
关键词
Advanced persistent threat; APT; Cybersecurity; Information security management; Situation awareness theory; Strategic disinformation; SITUATION AWARENESS;
D O I
10.1016/j.cose.2019.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and potent class of security threat. APT refers to knowledgeable human attackers that are organized, highly sophisticated and motivated to achieve their objectives against a targeted organization(s) over a prolonged period. Strategically-motivated APTs or S-APTs are distinct in that they draw their objectives from the broader strategic agenda of third parties such as criminal syndicates, nation-states, and rival corporations. In this paper we review the use of the term "advanced persistent threat," and present a formal definition. We then draw on military science, the science of organized conflict, for a theoretical basis to develop a rigorous and holistic model of the stages of an APT operation which we subsequently use to explain how S-APTs execute their strategically motivated operations using tactics, techniques and procedures. Finally, we present a general disinformation model, derived from situation awareness theory, and explain how disinformation can be used to attack the situation awareness and decision making of not only S-APT operators, but also the entities that back them. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:402 / 418
页数:17
相关论文
共 120 条
  • [91] Raiu C, 2012, COMPUT FRAUD SECUR, P5, DOI 10.1016/S1361-3723(12)70051-9
  • [92] Richardson R, 2015, INF SECUR, V17, P26
  • [93] Riley M., 2017, BLOOMBERG BUSINESSWE
  • [94] Ring T, 2013, COMPUT FRAUD SECUR, P5
  • [95] Safrie W, 2004, NY TIMES
  • [96] SBIC. Security for Business Innovation Council, 2011, 0711 SBIC CISO RPT
  • [97] Scott J., 2015, Strategic Studies Quarterly, V9, P60
  • [98] Scully Tim, 2011, J Bus Contin Emer Plan, V5, P195
  • [99] Shedden Piya, 2011, VINE, V41, P152, DOI 10.1108/03055721111134790
  • [100] Asset Identification in Information Security Risk Assessment: A Business Practice Approach
    Shedden, Piya
    Ahmad, Atif
    Smith, Wally
    Tscherning, Heidi
    Scheepers, Rens
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2016, 39 : 297 - 320