On-line Shared Platform Evaluation Framework for Advanced Persistent Threats

被引:0
|
作者
Sohn, Dongsik [1 ]
Lee, Taejin [2 ]
Kwak, Jin [3 ]
机构
[1] Ajou Univ, Dept Comp Engn, ISAA Lab, Suwon, South Korea
[2] Hoseo Univ, Dept Comp Engn, Cheonan, South Korea
[3] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
APT Evaluation; APT detection; Intrusion detection; APT evaluation framework; Detection Performance; BOTNET; FLOW;
D O I
10.3837/tiis.2019.05.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threats (APTs) are constant attacks of specific targets by hackers using intelligent methods. All current internal infrastructures are constantly subject to APT attacks created by external and unknown malware. Therefore, information security officers require a framework that can assess whether information security systems are capable of detecting and blocking APT attacks. Furthermore, an on-line evaluation of information security systems is required to cope with various malicious code attacks. A regular evaluation of the information security system is thus essential. In this paper, we propose a dynamic updated evaluation framework to improve the detection rate of internal information systems for malware that is unknown to most (over 60 %) existing static information security system evaluation methodologies using non-updated unknown malware.
引用
收藏
页码:2610 / 2628
页数:19
相关论文
共 50 条
  • [31] ON-LINE COMPUTER TECHNIQUES IN SHARED CATALOGING
    KNIESNER, DL
    MEYER, BJ
    LIBRARY RESOURCES & TECHNICAL SERVICES, 1973, 17 (02): : 225 - 230
  • [32] On-line ATC evaluation for largescale power systems: Framework and tool
    Chiang, HD
    Li, H
    APPLIED MATHEMATICS FOR RESTRUCTURED ELECTRIC POWER SYSTEMS: OPTIMIZATION, CONTROL, AND COMPUTATIONAL INTELLIGENCE, 2005, : 63 - 103
  • [33] An on-line platform for ground truthing and performance evaluation of text extraction systems
    Karatzas, Dimosthenis
    Robles, Sergi
    Gomez, Lluis
    2014 11TH IAPR INTERNATIONAL WORKSHOP ON DOCUMENT ANALYSIS SYSTEMS (DAS 2014), 2014, : 242 - 246
  • [34] Modeling social worm propagation for advanced persistent threats
    Zhou, Peng
    Gu, Xiaojing
    Nepal, Surya
    Zhou, Jianying
    COMPUTERS & SECURITY, 2021, 108
  • [35] Evidence-Based Detection of Advanced Persistent Threats
    Tecuci, Gheorghe
    Marcu, Dorin
    Meckl, Steven
    Boicu, Mihai
    COMPUTING IN SCIENCE & ENGINEERING, 2018, 20 (06) : 54 - 65
  • [36] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [37] Exploring the vulnerability in the inference phase of advanced persistent threats
    Wu, Qi
    Li, Qiang
    Guo, Dong
    Meng, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (03)
  • [38] Preventing Advanced Persistent Threats in Complex Control Networks
    Rubio, Juan E.
    Alcaraz, Cristina
    Lopez, Javier
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 402 - 418
  • [39] Concept and difficulties of advanced persistent threats (APT): Survey
    Khaleefa, Eman J.
    Abdulah, Dhahair A.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 4037 - 4052
  • [40] Advanced Persistent threats and how to monitor and deter them
    Tankard C.
    Network Security, 2011, 2011 (08) : 16 - 19