Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective

被引:6
作者
Nicho, Mathew [1 ]
Khan, Shafaq [2 ]
机构
[1] Univ Dubai, Coll Informat Technol, MSc Program, Dubai, U Arab Emirates
[2] Univ Dubai, Coll Informat Technol, Dubai, U Arab Emirates
关键词
Advanced Persistent Threats; APT; Data Breach; Information Security; Phishing; Social Engineering; Spear-Phishing;
D O I
10.4018/ijisp.2014010101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One of the most serious and persistent threat that has emerged in recent years combining technical as well as non-technical skills is the Advanced Persistent Threat, commonly known as APT where hackers circumvent the organizational defenses and instead target the naivety of the employees in making an unintentional mistake. While this threat has gained prominence in recent years, research on its cause and mitigation is still at the infancy stage. In this paper the authors explore APT vulnerabilities from an organizational perspective to create a taxonomy of non-technical and technical vulnerabilities. The objective is to enhance awareness and detection of APT vulnerabilities by managers and end users. To this end, the authors conducted interviews with senior IT managers in three large organizations in Dubai, United Arab Emirates. The analysis of the findings suggested that the APT threat environment is affected by multiple factors spanning primarily nontechnical as well as technical vulnerabilities.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
[41]   Defense scheme against advanced persistent threats in mobile fog computing security [J].
Waqas, Muhammad ;
Tu, Shanshan ;
Wan, Jialin ;
Mir, Talha ;
Alasmary, Hisham ;
Abbas, Ghulam .
COMPUTER NETWORKS, 2023, 221
[42]   DFA-AD: a distributed framework architecture for the detection of advanced persistent threats [J].
Sharma, Pradip Kumar ;
Moon, Seo Yeon ;
Moon, Daesung ;
Park, Jong Hyuk .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01) :597-609
[43]   Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach [J].
Sahabandu, Dinuka ;
Allen, Joey ;
Moothedath, Shana ;
Bushnell, Linda ;
Lee, Wenke ;
Poovendran, Radha .
2020 ACM/IEEE 11TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2020), 2020, :9-19
[44]   Towards a Framework to Detect Multi-Stage Advanced Persistent Threats Attacks [J].
Bhatt, Parth ;
Yano, Edgar Toshiro ;
Gustavsson, Per M. .
2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, :390-395
[45]   ANALYZING ADVANCED PERSISTENT THREATS USING GAME THEORY: A CRITICAL LITERATURE REVIEW [J].
Kumar, Rajesh ;
Singh, Siddhant ;
Kela, Rohan .
CRITICAL INFRASTRUCTURE PROTECTION XV, ICCIP 2021, 2022, 636 :45-69
[46]   Detection of Advanced Persistent Threats using Artificial Intelligence for Deep Packet Inspection [J].
Dijk, Allard .
2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, :2092-2097
[47]   Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction [J].
Al Mamun, Abdullah ;
Al-Sahaf, Harith ;
Welch, Ian ;
Camtepe, Seyit .
COMPUTERS & SECURITY, 2025, 149
[48]   Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage [J].
Abass, Ahmed A. Alabdel ;
Xiao, Liang ;
Mandayam, Narayan B. ;
Gajic, Zoran .
IEEE ACCESS, 2017, 5 :8482-8491
[49]   DFA-AD: a distributed framework architecture for the detection of advanced persistent threats [J].
Pradip Kumar Sharma ;
Seo Yeon Moon ;
Daesung Moon ;
Jong Hyuk Park .
Cluster Computing, 2017, 20 :597-609
[50]   Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems [J].
Hallaji, Ehsan ;
Razavi-Far, Roozbeh ;
Saif, Mehrdad .
APPLIED SCIENCES-BASEL, 2024, 14 (19)