Survey of attack and detection based on the full life cycle of APT

The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG Zhiwei, HE Xijie, YI Xin, LI Ziyang, CAO Xudong, YIN Tao, LI Shuhao, FU Anmin, ZHANG Yuqing
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024128/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539217803444224
author WANG Zhiwei
HE Xijie
YI Xin
LI Ziyang
CAO Xudong
YIN Tao
LI Shuhao
FU Anmin
ZHANG Yuqing
author_facet WANG Zhiwei
HE Xijie
YI Xin
LI Ziyang
CAO Xudong
YIN Tao
LI Shuhao
FU Anmin
ZHANG Yuqing
author_sort WANG Zhiwei
collection DOAJ
description The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle model was proposed, which was divided into four stages: information gathering, intrusion execution, internal network penetration, and data exfiltration. For each stage, recent research papers from the past five years were thoroughly reviewed, and the attack and detection techniques for each stage were analyzed. Finally, in light of the dynamic landscape of APT attack and defense technologies, the paper underscores the formidable challenges confronting both offense and defense and offers guidance for future research in this domain.
format Article
id doaj-art-9ab262d6ed904db69af444cb0c3f5f6b
institution Kabale University
issn 1000-436X
language zho
publishDate 2024-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9ab262d6ed904db69af444cb0c3f5f6b2025-01-14T07:24:59ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-09-014520622873358961Survey of attack and detection based on the full life cycle of APTWANG ZhiweiHE XijieYI XinLI ZiyangCAO XudongYIN TaoLI ShuhaoFU AnminZHANG YuqingThe advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle model was proposed, which was divided into four stages: information gathering, intrusion execution, internal network penetration, and data exfiltration. For each stage, recent research papers from the past five years were thoroughly reviewed, and the attack and detection techniques for each stage were analyzed. Finally, in light of the dynamic landscape of APT attack and defense technologies, the paper underscores the formidable challenges confronting both offense and defense and offers guidance for future research in this domain.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024128/APTnetwork kill chain modelfull life cycle0day attackdetect
spellingShingle WANG Zhiwei
HE Xijie
YI Xin
LI Ziyang
CAO Xudong
YIN Tao
LI Shuhao
FU Anmin
ZHANG Yuqing
Survey of attack and detection based on the full life cycle of APT
Tongxin xuebao
APT
network kill chain model
full life cycle
0day attack
detect
title Survey of attack and detection based on the full life cycle of APT
title_full Survey of attack and detection based on the full life cycle of APT
title_fullStr Survey of attack and detection based on the full life cycle of APT
title_full_unstemmed Survey of attack and detection based on the full life cycle of APT
title_short Survey of attack and detection based on the full life cycle of APT
title_sort survey of attack and detection based on the full life cycle of apt
topic APT
network kill chain model
full life cycle
0day attack
detect
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024128/
work_keys_str_mv AT wangzhiwei surveyofattackanddetectionbasedonthefulllifecycleofapt
AT hexijie surveyofattackanddetectionbasedonthefulllifecycleofapt
AT yixin surveyofattackanddetectionbasedonthefulllifecycleofapt
AT liziyang surveyofattackanddetectionbasedonthefulllifecycleofapt
AT caoxudong surveyofattackanddetectionbasedonthefulllifecycleofapt
AT yintao surveyofattackanddetectionbasedonthefulllifecycleofapt
AT lishuhao surveyofattackanddetectionbasedonthefulllifecycleofapt
AT fuanmin surveyofattackanddetectionbasedonthefulllifecycleofapt
AT zhangyuqing surveyofattackanddetectionbasedonthefulllifecycleofapt