Survey of attack and detection based on the full life cycle of APT
The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle...
Saved in:
Main Authors: | WANG Zhiwei, HE Xijie, YI Xin, LI Ziyang, CAO Xudong, YIN Tao, LI Shuhao, FU Anmin, ZHANG Yuqing |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024128/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimal active defense decision model of wireless communication network under APT attack
by: Meng MENG, et al.
Published: (2024-02-01) -
Multi-stage detection method for APT attack based on sample feature reinforcement
by: Lixia XIE, et al.
Published: (2022-12-01) -
Prediction method of 0day attack path based on cyber defense knowledge graph
by: Cheng SUN, et al.
Published: (2022-02-01) -
A discovery strategy for APT anomaly based on homologous behavior analysis
by: Yihan YU, et al.
Published: (2016-01-01) -
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
by: Yuancheng LI, et al.
Published: (2024-03-01)