Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1148
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdelaiye, Oluwasegun-
dc.contributor.authorAjibola, Aminat-
dc.contributor.authorFaki, Silas-
dc.date.accessioned2024-05-17T07:45:42Z-
dc.date.available2024-05-17T07:45:42Z-
dc.date.issued2018-12-24-
dc.identifier.citation3. Adelaiye, O. I., Ajibola, A., & Faki, S. A. (2018). Evaluating Advanced Persistent Threats Mitigation Effects: A Review. International Journal of Information Security Science, 7(4), 159-171.en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1148-
dc.description.abstractAdvanced Persistent Threat (APT) is a targeted attack method used by a sophisticated, determined and skilled adversary to maintain undetected access over an extended period for exfiltration of valuable data. APT poses high threat levels to organizations especially government organizations. 60% of the problem is the inability to detect penetration using traditional mitigation methods. Numerous researches indicate that vulnerabilities exists in most organizations and when exploited will have major fininacial implications and also affect the organizations reputation. Traditional methods for mitigating threats to information systems have proved ineffective. This paper aims at evaluating the utilization and effectiveness of Advanced Persistent Threat Mitigation techniques using existing literature and thereby providing a synopsis of APT. A method-based approach is adopted, reviewing the researches and a comparative analysis of the methods used in the mitigation of APT. The study compares 25 researches, which proposed methods in mitigating the threat. The research articles are filtered, separating mitigation methods from review articles, identifying the threats etc. from a wide range of research reports between 2011 and 2017. These 25 researches were analysed to show the effectiveness of 12 mitigation methods utilized by the researchers. In mitigating APT multiple methods are employed by 72% of the researchers. The major methods used in mitigating APT are Traffic/data analysis (30%), Pattern recognition (21%) and anomaly Detection (16%). These three methods work inline with providing effective internal audit, risk management and cooperate governance as highlighted in COBIT5 an IT management and governance framework by ISACA.en_US
dc.language.isoenen_US
dc.publisherINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCEen_US
dc.subjectAnomaly detectionen_US
dc.subjectExploiten_US
dc.subjectData exfiltrationen_US
dc.subjectPattern recognitionen_US
dc.subjectTraffic analysisen_US
dc.subjectZero-dayen_US
dc.titleEvaluating Advanced Persistent Threats Mitigation Effects: A Reviewen_US
dc.typeArticleen_US
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
Evaluating Advanced Persistent Threats Mitigation Effects A Review[#1048751]-2160188.PDF438.19 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.