Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures

被引:5
作者
Sharma A. [1 ]
Gupta B.B. [2 ,4 ,5 ,7 ]
Singh A.K. [6 ]
Saraswat V.K. [3 ]
机构
[1] Department of Computer Engineering, National Institute of Technology Kurukshetra, Kurukshetra
[2] International Center for AI and Cyber Security Research and Innovations, Department of Computer Science and Information Engineering, Asia University, Taichung
[3] NITI Aayog, New Delhi
[4] Lebanese American University, Beirut
[5] School of Computing, Skyline University College, Sharjah
[6] Department of Computer Engineering, National Institute of Technology Kurukshetra, Kurukshetra
[7] Birkbeck, University of London, London
关键词
Advanced Persistent Threats; Attack graph; Attribution; Cyber attacks; Fast-Flux Service Network (FFSN); Malware; Moving Target Defense (MTD); Negative-day malware; Tactics Techniques and Procedures (TTP);
D O I
10.1007/s12652-023-04603-y
中图分类号
学科分类号
摘要
In today’s cyber warfare realm, every stakeholder in cyberspace is becoming more potent by developing advanced cyber weapons. They have equipped with the most advanced malware and maintain a hidden attribution. The precocious cyber weapons, targeted and motivated with some specific intention are called as Advanced Persistent Threats (APT). Developing defense mechanisms and performing attribution analysis of such advanced attacks are extremely difficult due to the intricate design of attack vector and sophisticated malware employed with high stealth and evasive techniques. These attacks also include advanced zero-day and negative-day exploits and payloads. This paper provides a comprehensive survey on the evolution of advanced malware design paradigms, APT attack vector and its anatomy, APT attack Tactics, Techniques, and Procedures (TTP) and specific case studies on open-ended APT attacks. The survey covers a detailed discussion on APT attack phases and comparative study on threat life-cycle specification by various organizations. This work also addresses the APT attack attribution and countermeasures against these attacks from classical signature and heuristic based detection to modern machine learning and genetics based detection mechanisms along with sophisticated zero-day and negative day malware countermeasure by various techniques like monitoring of network traffic and DNS logs, moving target based defense, and attack graph based defenses. Furthermore, the survey addresses various research scopes in the domain of APT cyber-attacks. © 2023, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:9355 / 9381
页数:26
相关论文
共 150 条
[1]  
Adelstein F., Stillerman M., Kozen D., Malicious code detection for open firmware, In 18Th Annual Computer Security Applications Conference, pp. 403-412, (2002)
[2]  
Albanese M., Jajodia S., Noel S., Time-efficient and cost-effective network hardening using attack graphs, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1-12, (2012)
[3]  
Alrabaee S., Saleem N., Preda S., Wang L., Debbabi M., Oba2: an onion approach to binary code authorship attribution, Digit Investig, 11, pp. S94-S103, (2014)
[4]  
Alrabaee S., Shirani P., Debbabi M., Wang L., On the feasibility of malware authorship attribution, International Symposium on Foundations and Practice of Security, pp. 256-272, (2016)
[5]  
Alshamrani A., Myneni S., Chowdhary A., Huang D., A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities, IEEE Commun Surv Tutor, 21, 2, pp. 1851-1877, (2019)
[6]  
Altaher A., An improved android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (ehnfc) and permission-based features, Neural Comput Appl, 28, 12, pp. 4147-4157, (2017)
[7]  
Antoine L., Joan C., Francois M., Fernandez Jose M., Survey of publicly available reports on advanced persistent threat actors, Comput Secur, 72, pp. 26-59, (2018)
[8]  
Smoke Loader, (2020)
[9]  
Austin T.H., Filiol E., Josse S., Stamp M., Exploring hidden markov models for virus analysis: A semantic approach, In 2013 46Th Hawaii International Conference on System Sciences, pp. 5039-5048, (2013)
[10]  
Beaucamps P., Advanced polymorphic techniques, Int J Comput Sci, 2, 3, pp. 194-205, (2007)