BHU Digital Repository

Mitigating Advanced Persistent Threats: A Comparative Evaluation Review

Show simple item record

dc.contributor.author Ajibola, Aminat
dc.contributor.author Adelaiye, Oluwasegun
dc.contributor.author Ujata, Innocent
dc.contributor.author Rahman, Noorihan Abdul
dc.date.accessioned 2024-05-21T09:57:08Z
dc.date.available 2024-05-21T09:57:08Z
dc.date.issued 2019
dc.identifier.citation Ajibola, A., Ujata, I., Adelaiye, O., & Rahman, N. A. (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security & Cybercrime, 8(2). en_US
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/1250
dc.description.abstract Cyber threats have been an issue of great concern since the advent of the information (computer and internet) age. But of greater concern is the most recent class of threats, known as Advanced Persistent Threats (APTs). It has drawn increasing attention all over the world, from researchers, and the industrial security sector. APTs are sophisticated cyber-attacks executed by sophisticated and well-resourced adversaries targeting specific information in companies and government. APT is a long- term campaign involving different steps. This form of attack if successful has significant implications to countries and large organizations, which may be from financial to reputational damage. This work presents a comprehensive study on APT, characterizing its uniqueness and attack model, and analyzing techniques commonly seen in APT attacks. On evaluating mitigation effects proposed and developed by researches, the use of a multiple mitigation methods shows good signs in detecting and preventing APT. Anomaly detection and dynamic analysis show high accuracy levels in detecting APT. This work also highlights and recommends security tips as well as methods of implementing countermeasures that can help to mitigate APTs, thereby giving directions for future research en_US
dc.language.iso en en_US
dc.publisher International Journal of Information Security and Cybercrime en_US
dc.subject Information Security en_US
dc.subject Phishing en_US
dc.subject social engineering en_US
dc.subject cyber warfare en_US
dc.subject Zero-day en_US
dc.title Mitigating Advanced Persistent Threats: A Comparative Evaluation Review en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BHUDR


Advanced Search

Browse

My Account