Advertisement

New Perspectives in the Study of Advanced Persistent Threats

  • Santiago Quintero-BonillaEmail author
  • Angel Martín del Rey
  • Araceli Queiruga-Dios
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 619)

Abstract

Advanced persistent threats (APTs) are the new type of cyber attacks that have drastically change the information security landscape. They seek to gather very sensitive information from specific and high-level objectives. The great majority of security tools do not allow handling such an intrusion in a proper way. Consequently, this study aims to analyze its behavior in order to design an agent-based model to simulate the APT cycle of life.

Keywords

Advanced persistent threats Information security Cyber attacks Simulation Agent-based models 

Notes

Acknowledgements

This work has been supported by Ministerio de Economía y Competitividad (Spain) and the European Union through FEDER funds under grant TIN2014-55325-C2-2-R.

S. Quintero Bonilla has been supported by IFARHU-SENACYT scholarship program (Panama).

References

  1. 1.
    Chen, P., Desmet, L., Huygens, C.: A study of advanced persistent threats. In: De Decker, B., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 63–72. Springer (2014)Google Scholar
  2. 2.
    Hu, P., Li, H., Cansever, D., Prasant, M.: Dynamic defense strategy against advanced. In: Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 747–755. IEEE (2015)Google Scholar
  3. 3.
    Jeun, I., Lee, Y., Won, D.: A practical study on advanced persistent threats. In: Kim, T., et al. (eds.) SecTech/CA/CES 2012, CCIS, vol. 339, pp. 144–152. Springer (2012)Google Scholar
  4. 4.
    Niu, W., Zhan, X., Li, K., Yang, G., Chen, R.: Modeling attack process of advanced persistent threat. In: Wang, G., et al. (ed.) Proceedings of SpaCCS 2016. LNCS, vol. 10066, pp. 383–391. Springer (2016)Google Scholar
  5. 5.
    Shenwen, L., Yingbo, L., Xiongjie, D.: Study and research of APT detection technology based on big data processing architecture. In: Proceedings of the IEEE 5th International Conference on Electronics Information and Emergency Communication, pp. 313–316. IEEE (2015)Google Scholar
  6. 6.
    Tran, H., Campos-Nanez, E., Fomin, P., Wasek, J.: Cyber resilience recovery model to combat zero-day malware attacks. Comput. Secur. 61, 19–31 (2016)CrossRefGoogle Scholar
  7. 7.
    Ussath, M., Jaeger, D., Cheng, F., Meinel, C.: Advanced persistent threats: behind the scenes. In: Proceedings of the 2016 Annual Conference on Information Science and Systems (CISS), pp. 181–186. IEEE (2016)Google Scholar
  8. 8.
    Whitaker, E., Lee-Urban, S.: Intelligent agent representations of malware: analysis to prepare for future cyber threats. In: Nicholson, D. (ed.) Advanced in Human Factors in Cybersecurity. AISC, vol. 501, pp. 391–400. Springer (2016)Google Scholar
  9. 9.
    Zhao, W., Wang, P., Zhang, F.: Extended petri net-based advanced persistent threat analysis model. In: Wong, W.E., Zhu, T. (eds.) Computer Engineering and Networking. LNEE, vol. 277, pp. 1297–1305. Springer (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Santiago Quintero-Bonilla
    • 1
    Email author
  • Angel Martín del Rey
    • 1
  • Araceli Queiruga-Dios
    • 1
  1. 1.Department of Applied MathematicsUniversity of SalamancaSalamancaSpain

Personalised recommendations