Survey of attack and detection based on the full life cycle of APT

The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG Zhiwei, HE Xijie, YI Xin, LI Ziyang, CAO Xudong, YIN Tao, LI Shuhao, FU Anmin, ZHANG Yuqing
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024128/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle model was proposed, which was divided into four stages: information gathering, intrusion execution, internal network penetration, and data exfiltration. For each stage, recent research papers from the past five years were thoroughly reviewed, and the attack and detection techniques for each stage were analyzed. Finally, in light of the dynamic landscape of APT attack and defense technologies, the paper underscores the formidable challenges confronting both offense and defense and offers guidance for future research in this domain.
ISSN:1000-436X