Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1253
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | ADELAIYE, Oluwasegun | - |
dc.contributor.author | Ajibola, Aminat | - |
dc.contributor.author | Musa, Yusuf | - |
dc.date.accessioned | 2024-05-21T10:05:20Z | - |
dc.date.available | 2024-05-21T10:05:20Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | 7. Adelaiye, O. I., Ajibola, A. & Yusuf, M. (2020) Detecting Lateral Movement in a Network for Combating Advanced Persistent Threats. International Journal of Information Processing and Communication (IJIPC). 9(1&2), 209-220 | en_US |
dc.identifier.issn | 2141-3959 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1253 | - |
dc.description.abstract | Cyber security has in recent times been on the headlines and an area of great concern and threat to developed nations. These threats have metamorphosed into more advanced threats including a threat termed Advanced Persistent Threat. Advanced Persistent Threat (APT) is a highly coordinated attack method that exploits existing but unknown vulnerabilities. These adversaries are sophisticated, skilled and are highly determined to gain undetected access over an extended period and steal valuable data. APT poses high threat levels to organizations especially the government organizations. This study identified that 60% of the problem is the inability to detect penetration using traditional mitigation methods. The APT attack operates in phases which include: selecting a target, information gathering, gaining access, exploitation, operation, data discovery and collection, and data exfiltration listed from the first to the seventh phase. The fifth and sixth phase of the process deals with the lateral movement (spread) of malwares after internal reconnaissance is done. This study uses a statistical analysis approach on a dataset containing 939,394 payloads, and identifies patterns key in accurately identifying malicious verses normal data traffic. The attributes that showed a difference were source port and size in bytes. Results show that the ports used for scanning attacks are 90% unassigned ports and dynamic/private ports and, utilize data sizes of almost zero bytes. These patterns that form rules, detect the presence of APT attacks in a network. This approach is in line with CORBIT 5 and ISO no. ISO/IEC 27033-4:2014. | en_US |
dc.description.sponsorship | Self | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Information Processing and Communication (IJIPC) | en_US |
dc.relation.ispartofseries | VOL 9;NO 1&2 | - |
dc.subject | Reconnaissance | en_US |
dc.subject | Zero-day | en_US |
dc.subject | Information security | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Malware | en_US |
dc.title | Detecting Lateral Movement in a Network for Combating Advanced Persistent Threats | en_US |
dc.type | Article | en_US |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
429-8-1368-1-10-20200517.pdf | 783.48 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.