메뉴 건너뛰기




Volumn 75, Issue 8, 2019, Pages 4543-4574

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

Author keywords

APT; Exploitation; Threat; Vulnerability; Zero day attack

Indexed keywords

LIFE CYCLE; SEMANTICS;

EID: 84986247560     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-016-1850-4     Document Type: Article
Times cited : (98)

References (135)
  • 3
    • 84919639285 scopus 로고    scopus 로고
    • MLDS: multi-layer defense system for preventing advanced persistent threats
    • Moon D, Im H, Lee JD, Jong Park H (2014) MLDS: multi-layer defense system for preventing advanced persistent threats. Symmetry 6(4):997–1010
    • (2014) Symmetry , vol.6 , Issue.4 , pp. 997-1010
    • Moon, D.1    Im, H.2    Lee, J.D.3    Jong, P.H.4
  • 4
    • 80052169144 scopus 로고    scopus 로고
    • Advanced persistent threats and how to monitor and deter them
    • Tankard C (2011) Advanced persistent threats and how to monitor and deter them. Netw Secur 8:16–19
    • (2011) Netw Secur , vol.8 , pp. 16-19
    • Tankard, C.1
  • 5
    • 84873369793 scopus 로고    scopus 로고
    • Targeted cyberattacks: a superset of advanced persistent threats
    • Sood AK, Enbody RJ (2013) Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur Priv 11(1):54–61
    • (2013) IEEE Secur Priv , vol.11 , Issue.1 , pp. 54-61
    • Sood, A.K.1    Enbody, R.J.2
  • 6
    • 84908266997 scopus 로고    scopus 로고
    • Combating advanced persistent threats: from network event correlation to incident detection
    • Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: from network event correlation to incident detection. Comput Secur 48:35–57
    • (2015) Comput Secur , vol.48 , pp. 35-57
    • Friedberg, I.1    Skopik, F.2    Settanni, G.3    Fiedler, R.4
  • 10
    • 84870717848 scopus 로고    scopus 로고
    • How digital detectives deciphered Stuxnet, the most menacing malware in history
    • Zetter K (2011) How digital detectives deciphered Stuxnet, the most menacing malware in history. Wired Mag 11:1–8
    • (2011) Wired Mag , vol.11 , pp. 1-8
    • Zetter, K.1
  • 11
    • 78650062267 scopus 로고    scopus 로고
    • Accessed 10 May 2016
    • Falliere N, Murchu L, Chien E (2015) W32.Stuxnet.Dossier. https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier. Accessed 10 May 2016
    • (2015) W32.Stuxnet.Dossier
    • Falliere, N.1    Murchu, L.2    Chien, E.3
  • 17
    • 85080587527 scopus 로고    scopus 로고
    • Integrated analysis on case study of steve gibson ddos attack may 4th, 2001: performance of testing tools and in the context of business
    • Bhatti AT (2015) Integrated analysis on case study of steve gibson ddos attack may 4th, 2001: performance of testing tools and in the context of business. Int J Res Comput Appl Robot 3(7):8–12
    • (2015) Int J Res Comput Appl Robot , vol.3 , Issue.7 , pp. 8-12
    • Bhatti, A.T.1
  • 18
    • 85080570799 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious JavaScript code
    • ACM
    • Cova M, Kruegel C, Vigna G (2012) Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proc. 19th Int’l Conf. World Wide Web, ACM
    • (2012) Proc. 19Th Int’l Conf. World Wide Web
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 20
    • 85080627213 scopus 로고    scopus 로고
    • Invincea, Inc, Accessed 20 June
    • Spear-Phishing, watering hole and drive-by attacks: the new normal. Invincea, Inc. https://www.invincea.com/wp-content/uploads/2013/10/Invincea-spear-phishing-watering-holedrive-by-whitepaper-2013.pdf. Accessed 20 June 2016
    • (2016) Spear-Phishing, Watering Hole and Drive-By Attacks: The New Normal
  • 21
    • 84960410183 scopus 로고    scopus 로고
    • A study of agent system model for response to spear-phishing
    • Kim CH, Kim S, Kim JB (2016) A study of agent system model for response to spear-phishing. Int Inf Inst Tokyo Inf 19(1):263
    • (2016) Int Inf Inst Tokyo Inf , vol.19 , Issue.1 , pp. 263
    • Kim, C.H.1    Kim, S.2    Kim, J.B.3
  • 22
    • 84873342212 scopus 로고    scopus 로고
    • Into the darkness: Dissecting targeted attacks
    • Accessed 16 July 2016
    • Branco R (2011) Into the darkness: dissecting targeted attacks. Qualys Blog. https://blog.qualys.com/securitylabs/2011/11/30/dissecting-targeted-attacks. Accessed 16 July 2016
    • (2011) Qualys Blog
    • Branco, R.1
  • 24
    • 84873338401 scopus 로고    scopus 로고
    • Mass meshing injection: Sidename.js (now cssminibar.js) ongoing
    • Accessed 14 June 2016
    • Huang W, Hsiao C, Lin N (2011) Mass meshing injection: Sidename.js (now cssminibar.js) ongoing. Armorize Malware Blog. http://blog.armorize.com/2011/06/mass-meshing-injectionsidenamejs.html. Accessed 14 June 2016
    • (2011) Armorize Malware Blog
    • Huang, W.1    Hsiao, C.2    Lin, N.3
  • 25
    • 84873338401 scopus 로고    scopus 로고
    • Malvertising on google doubleclick ongoing
    • Accessed 26 July 2016
    • Huang W, Hsiao C, Lin N (2011) Malvertising on google doubleclick ongoing. Armorize Malware Blog. http://blog.armorize.com/2011/08/k985ytvhtm-fake-antivirus-mass.html. Accessed 26 July 2016
    • (2011) Armorize Malware Blog
    • Huang, W.1    Hsiao, C.2    Lin, N.3
  • 26
    • 85080627543 scopus 로고    scopus 로고
    • Design and Operational Guide to Cope with advanced persistent threats
    • Accessed 25 Apr 2016
    • Information-technology Promotion Agency, Design and Operational Guide to Cope with advanced persistent threats. Japan (IPA) (2011). https://www.ipa.go.jp/security/english/third.html. Accessed 25 Apr 2016
    • Japan (IPA) (2011
  • 31
    • 84863590115 scopus 로고    scopus 로고
    • A security analysis of Amazon’s elastic compute cloud service
    • Applied Computing, ACM
    • Balduzzi et al M (2012) A security analysis of Amazon’s elastic compute cloud service. In: Proc. 27th Ann. ACM Symp. Applied Computing, ACM
    • (2012) Proc. 27Th Ann. ACM Symp
    • Balduzzi, M.1
  • 33
    • 84873371573 scopus 로고    scopus 로고
    • Exploiting smart-phone USB connectivity for fun and profit
    • Stavrou A, Wang Z (2011) Exploiting smart-phone USB connectivity for fun and profit. In: BlackHat DC Conf
    • (2011) Blackhat DC Conf
    • Stavrou, A.1    Wang, Z.2
  • 34
    • 84873338158 scopus 로고    scopus 로고
    • Thoughts about trusted computing
    • Rutkowska J (2009) Thoughts about trusted computing. In: EuSecWest Conf
    • (2009) Eusecwest Conf
    • Rutkowska, J.1
  • 35
    • 84894556085 scopus 로고    scopus 로고
    • k-zero day safety A network security metric for measuring the risk of unknown vulnerabilities
    • Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety A network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secure Comput 11(1):30–44
    • (2014) IEEE Trans Dependable Secure Comput , vol.11 , Issue.1 , pp. 30-44
    • Wang, L.1    Jajodia, S.2    Singhal, A.3    Cheng, P.4    Noel, S.5
  • 37
    • 85080524335 scopus 로고    scopus 로고
    • Accessed 6 July
    • What is a zero-day vulnerability? http://www.pctools.com/security-news/zero-day-vulnerability/. Accessed 6 July 2016
    • (2016)
  • 38
    • 85080607823 scopus 로고    scopus 로고
    • Accessed 15 May
    • https://en.wikipedia.org/wiki/Zero-day_(computing). Accessed 15 May 2016
    • (2016)
  • 40
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • James PF, Rohozinski R (2011) Stuxnet and the future of cyber war. Surv Glob Polit Strat 53(1):23–40
    • (2011) Surv Glob Polit Strat , vol.53 , Issue.1 , pp. 23-40
    • James, P.F.1    Rohozinski, R.2
  • 42
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: dissecting a cyber warfare weapon
    • Langner R (2011) Stuxnet: dissecting a cyber warfare weapon. IEEE Secur Priv 9(3):49–51
    • (2011) IEEE Secur Priv , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 44
    • 84856498738 scopus 로고    scopus 로고
    • Protecting against spear-phishing
    • Parmar B (2012) Protecting against spear-phishing. Comput Fraud Secur 2012(1):8–11
    • (2012) Comput Fraud Secur , vol.2012 , Issue.1 , pp. 8-11
    • Parmar, B.1
  • 46
    • 84955276577 scopus 로고    scopus 로고
    • STUXNET, DUQU and beyond
    • Faisal Mohammad, Ibrahim Mohammad (2012) STUXNET, DUQU and beyond. Int J Sci Eng Investig 1(2):75–78
    • (2012) Int J Sci Eng Investig , vol.1 , Issue.2 , pp. 75-78
    • Faisal, M.1    Ibrahim, M.2
  • 49
    • 85080493612 scopus 로고    scopus 로고
    • Accessed 10 June
    • http://www.enterpriseitnews.com.my/malaysia-organizations-more-likely-to-be-targeted-with-cyber-attacks-fireeye-report/3.4ref. Accessed 10 June 2016
    • (2016)
  • 50
    • 85080588045 scopus 로고    scopus 로고
    • Accessed 19 June
    • https://www.fireeye.com/current-threats/annual-threat-report.html3.4ref. Accessed 19 June 2016
    • (2016)
  • 51
    • 85080604391 scopus 로고    scopus 로고
    • Accessed 10 May
    • http://www.computerweekly.com/news/4500260196/Cyber-attacks-an-increasing-concern-for-Asean-countries. Accessed 10 May 2016
    • (2016)
  • 52
    • 85080515152 scopus 로고    scopus 로고
    • Accessed 5 July
    • http://www.computerweekly.com/news/4500260196/Cyber-attacks-an-increasing-concern-for-Asean-countries. Accessed 5 July 2016
    • (2016)
  • 53
    • 80051793908 scopus 로고    scopus 로고
    • Data preprocessing for anomaly based network intrusion detection: a review
    • Davis J, Clarck A (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30:353–375
    • (2011) Comput Secur , vol.30 , pp. 353-375
    • Davis, J.1    Clarck, A.2
  • 54
    • 81055146872 scopus 로고    scopus 로고
    • Reducing false negatives in intelligent intrusion detection decision response system
    • Kai HM, Liu XJ, Liu YF, Zhou L (2011) Reducing false negatives in intelligent intrusion detection decision response system. Appl Mech Mater 128:676–681
    • (2011) Appl Mech Mater , vol.128 , pp. 676-681
    • Kai, H.M.1    Liu, X.J.2    Liu, Y.F.3    Zhou, L.4
  • 55
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Oakland
    • Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, Oakland
    • (2010) IEEE Symposium on Security and Privacy
    • Sommer, R.1    Paxson, V.2
  • 56
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks an collaborative intrusion detection
    • Zhou C, Leckie C, Karunasekera S (2010) A survey of coordinated attacks an collaborative intrusion detection. Comput Secur 29:124–140
    • (2010) Comput Secur , vol.29 , pp. 124-140
    • Zhou, C.1    Leckie, C.2    Karunasekera, S.3
  • 59
    • 85080568505 scopus 로고    scopus 로고
    • Accessed 29 July
    • Cisco: Cisco IOS NetFlow. http://cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html. Accessed 29 July 2015
    • (2015)
  • 60
    • 85080488618 scopus 로고    scopus 로고
    • Accessed 29 July
    • University of California: KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 29 July 2015
    • (2015)
  • 62
    • 85080554532 scopus 로고    scopus 로고
    • Detection of intrusions and malware, and vulnerability assessment
    • DIMVA Vienna, Austria, July 7–8. Springer, New York
    • Julisch K, Kruegel C (2005) Detection of intrusions and malware, and vulnerability assessment. In: Proceedings of 2nd International Conference, DIMVA Vienna, Austria, July 7–8. Springer, New York
    • (2005) Proceedings of 2Nd International Conference
    • Julisch, K.1    Kruegel, C.2
  • 64
    • 85080528589 scopus 로고    scopus 로고
    • Accessed 29 July
    • W3C: Semantic web. http://www.w3.org/standards/semanticweb/. Accessed 29 July 2015
    • (2015)
  • 67
    • 85080600016 scopus 로고    scopus 로고
    • W3C: SPARQL 1.1 Overview, Accessed 29 July
    • W3C: SPARQL 1.1 Overview. http://www.w3.org/TR/sparql11-overview/. Accessed 29 July 2015
    • (2015)
  • 71
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. semantics: competing approaches to dynamic network intrusion detection
    • Scheirer W, Chuah MC (2008) Syntax vs. semantics: competing approaches to dynamic network intrusion detection. Int J Secure Netw 3(1):24–35
    • (2008) Int J Secure Netw , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.C.2
  • 73
    • 34249753618 scopus 로고
    • Support-vector networks
    • Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297
    • (1995) Mach Learn , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 76
    • 85080541401 scopus 로고    scopus 로고
    • Accessed 10 Jan
    • Cisco: Snort.Org. https://www.snort.org/. Accessed 10 Jan 2015
    • (2015) Cisco: Snort.Org
  • 84
    • 84906968815 scopus 로고    scopus 로고
    • Context infusion in semantic link networks to detect cyber-attacks: A flow-based detection approach
    • Aleroud A, Karabatis G (2014) Context infusion in semantic link networks to detect cyber-attacks: a flow-based detection approach. IEEE, pp 175–182
    • (2014) IEEE , pp. 175-182
    • Aleroud, A.1    Karabatis, G.2
  • 86
    • 84903138908 scopus 로고    scopus 로고
    • Ontology for attack detection: an intelligent approach to web application security
    • Razzaq A, Anwar Z, Ahmad HF, Latif K, Munir F (2014) Ontology for attack detection: an intelligent approach to web application security. Comput Secur 45:124–146. doi:10.1016/j.cose.05.005
    • (2014) Comput Secur , vol.45 , pp. 124-146
    • Razzaq, A.1    Anwar, Z.2    Ahmad, H.F.3    Latif, K.4    Munir, F.5
  • 87
    • 1842550305 scopus 로고    scopus 로고
    • OWL web ontology language overview
    • McGuinness DL, Van HF (2004) OWL web ontology language overview. W3C Recomm 10(10):101
    • (2004) W3C Recomm , vol.10 , Issue.10 , pp. 101
    • McGuinness, D.L.1    Van, H.F.2
  • 88
    • 35048883095 scopus 로고    scopus 로고
    • A model for the semantics of attack signatures in misuse detection systems
    • Springer, New York
    • Meier M (2004) A model for the semantics of attack signatures in misuse detection systems. In: Information security. Lecture notes in computer science, vol 3225. Springer, New York, pp 158–169
    • (2004) Information Security. Lecture Notes in Computer Science , vol.3225 , pp. 158-169
    • Meier, M.1
  • 89
    • 22044458646 scopus 로고    scopus 로고
    • An overview of OntoClean
    • Springer, New York
    • Guarino N, Welty CA (2009) An overview of OntoClean. In: Handbook on ontologies. Springer, New York, pp 201–220
    • (2009) Handbook on Ontologies , pp. 201-220
    • Guarino, N.1    Welty, C.A.2
  • 91
    • 85006606543 scopus 로고    scopus 로고
    • Fuzzy aided application layer semantic intrusion detection system—FASIDS
    • Sangeetha S, Vaidehi V (2010) Fuzzy aided application layer semantic intrusion detection system—FASIDS. Int J Netw Secur Appl 2(2):39–56
    • (2010) Int J Netw Secur Appl , vol.2 , Issue.2 , pp. 39-56
    • Sangeetha, S.1    Vaidehi, V.2
  • 92
    • 85080608589 scopus 로고    scopus 로고
    • Accessed 29 July 2015
    • Farrell JA (2015). http://www.cs.man.ac.uk/~pjj/farrell/comp2.html#EBNF. Accessed 29 July 2015
    • (2015)
    • Farrell, J.A.1
  • 93
    • 0022578592 scopus 로고
    • Fuzzy cognitive maps
    • Kosko B (1986) Fuzzy cognitive maps. Int J Man Mach Stud 24(1):65–75
    • (1986) Int J Man Mach Stud , vol.24 , Issue.1 , pp. 65-75
    • Kosko, B.1
  • 95
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Sov Phys Doklady 10:707–710
    • (1966) Sov Phys Doklady , vol.10 , pp. 707-710
    • Levenshtein, V.I.1
  • 96
    • 81455146798 scopus 로고    scopus 로고
    • Pattern analysis and signature extraction for intrusion attacks on web services
    • Thakar U, Dagdee N (2010) Pattern analysis and signature extraction for intrusion attacks on web services. Int J Netw Secur Appl 2(3):190–205. doi:10.5121/ijnsa.2010.2313
    • (2010) Int J Netw Secur Appl , vol.2 , Issue.3 , pp. 190-205
    • Thakar, U.1    Dagdee, N.2
  • 100
    • 34250739801 scopus 로고    scopus 로고
    • Vanguard: A new detection scheme for a class of TCP-targeted denial-of-service attacks
    • NOMS, 10th IEEE/IFIP
    • Luo X, Chan EW, Chang RK (2006) Vanguard: a new detection scheme for a class of TCP-targeted denial-of-service attacks. In: Network Operations and Management Symposium, NOMS, 10th IEEE/IFIP, pp 507–518
    • (2006) Network Operations and Management Symposium , pp. 507-518
    • Luo, X.1    Chan, E.W.2    Chang, R.K.3
  • 103
    • 85080582891 scopus 로고    scopus 로고
    • Accessed 22 Sept
    • MITRE Corporation: CVE-Common Vulnerabilities and Exposures (CVE). https://cve.mitre.org/. Accessed 22 Sept 2015
    • (2015)
  • 107
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware-analysis techniques and tools
    • Egele M, Scholte T, Kirda E, Kruegel C (2012) A survey on automated dynamic malware-analysis techniques and tools. ACM Comput Surv (CSUR) 44(2):6
    • (2012) ACM Comput Surv (CSUR) , vol.44 , Issue.2 , pp. 6
    • Egele, M.1    Scholte, T.2    Kirda, E.3    Kruegel, C.4
  • 112
    • 34249865012 scopus 로고    scopus 로고
    • Research on intrusion detection and response: a survey
    • Peyman K, Ali AG (2005) Research on intrusion detection and response: a survey. IJ Netw Secur 1(2):84–102
    • (2005) IJ Netw Secur , vol.1 , Issue.2 , pp. 84-102
    • Peyman, K.1    Ali, A.G.2
  • 116
    • 0001825730 scopus 로고    scopus 로고
    • Methontology: From ontological art towards ontological engineering
    • American Association for Artificial Intelligence
    • FernándezL M, Gómez-Pérez A, Juristo N (1997) Methontology: from ontological art towards ontological engineering. In: AAAI Symposium on Ontological Engineering, American Association for Artificial Intelligence
    • (1997) AAAI Symposium on Ontological Engineering
    • Fernándezl, M.1    Gómez-Pérez, A.2    Juristo, N.3
  • 118
    • 20544433820 scopus 로고    scopus 로고
    • Extracting attack knowledge using principal-subordinate consequence tagging case grammar and alerts semantic networks
    • Yan W, Hou E, Ansari N (2004) Extracting attack knowledge using principal-subordinate consequence tagging case grammar and alerts semantic networks. In: Local Computer Networks, 29th Annual IEEE International Conference on, pp 110–100
    • (2004) Local Computer Networks, 29Th Annual IEEE International Conference On , pp. 110-100
    • Yan, W.1    Hou, E.2    Ansari, N.3
  • 122
    • 84862190056 scopus 로고    scopus 로고
    • A language driven intrusion detection system for event and alert correlation
    • Kluwer Academic, Toulouse, Springer, New York
    • Totel E, Vivinis B, Mé L (2004) A language driven intrusion detection system for event and alert correlation. In: Proceedings at the 19th IFIP International Information Security Conference. Kluwer Academic, Toulouse, Springer, New York, pp 209–224
    • (2004) Proceedings at the 19Th IFIP International Information Security Conference , pp. 209-224
    • Totel, E.1    Vivinis, B.2    Mé, L.3
  • 124
    • 3042646967 scopus 로고    scopus 로고
    • Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning
    • Gorodetski V, Kotenko I, Karsaev O (2003) Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning. Comput Syst Sci Eng 18(4):191–200
    • (2003) Comput Syst Sci Eng , vol.18 , Issue.4 , pp. 191-200
    • Gorodetski, V.1    Kotenko, I.2    Karsaev, O.3
  • 126
    • 84905692209 scopus 로고    scopus 로고
    • Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains
    • Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Issues Inf Warfare Secur Res 1:80
    • (2011) Lead Issues Inf Warfare Secur Res , vol.1 , pp. 80
    • Hutchins, E.M.1    Cloppert, M.J.2    Amin, R.M.3
  • 128
    • 50149111119 scopus 로고    scopus 로고
    • Information fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking
    • Stotz A, Sudit M (2007) Information fusion engine for real-time decision-making (INFERD): a perceptual system for cyber attack tracking. In: Information Fusion, 2007 10th International Conference on, pp 1–8
    • (2007) Information Fusion, 2007 10Th International Conference On , pp. 1-8
    • Stotz, A.1    Sudit, M.2
  • 130
    • 85080500516 scopus 로고    scopus 로고
    • Accessed 29 July
    • GlobalSecurity.org: Open Source Information System (OSIS). http://www.globalsecurity.org/intell/systems/ osis.htm. Accessed 29 July 2015
    • (2015) Open Source Information System (OSIS


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.