Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1250
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAjibola, Aminat-
dc.contributor.authorAdelaiye, Oluwasegun-
dc.contributor.authorUjata, Innocent-
dc.contributor.authorRahman, Noorihan Abdul-
dc.date.accessioned2024-05-21T09:57:08Z-
dc.date.available2024-05-21T09:57:08Z-
dc.date.issued2019-
dc.identifier.citationAjibola, A., Ujata, I., Adelaiye, O., & Rahman, N. A. (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security & Cybercrime, 8(2).en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1250-
dc.description.abstractCyber threats have been an issue of great concern since the advent of the information (computer and internet) age. But of greater concern is the most recent class of threats, known as Advanced Persistent Threats (APTs). It has drawn increasing attention all over the world, from researchers, and the industrial security sector. APTs are sophisticated cyber-attacks executed by sophisticated and well-resourced adversaries targeting specific information in companies and government. APT is a long- term campaign involving different steps. This form of attack if successful has significant implications to countries and large organizations, which may be from financial to reputational damage. This work presents a comprehensive study on APT, characterizing its uniqueness and attack model, and analyzing techniques commonly seen in APT attacks. On evaluating mitigation effects proposed and developed by researches, the use of a multiple mitigation methods shows good signs in detecting and preventing APT. Anomaly detection and dynamic analysis show high accuracy levels in detecting APT. This work also highlights and recommends security tips as well as methods of implementing countermeasures that can help to mitigate APTs, thereby giving directions for future researchen_US
dc.language.isoenen_US
dc.publisherInternational Journal of Information Security and Cybercrimeen_US
dc.subjectInformation Securityen_US
dc.subjectPhishingen_US
dc.subjectsocial engineeringen_US
dc.subjectcyber warfareen_US
dc.subjectZero-dayen_US
dc.titleMitigating Advanced Persistent Threats: A Comparative Evaluation Reviewen_US
dc.typeArticleen_US
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
Mitigating Advanced Persistent Threats A Comparative Evaluation Review.pdf206.59 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.