Research on the Defense of Advanced Persistent Threats in Enterprise Network
Recently,advanced persistent threats have become a hot spot of information security industry as so many reports were taken about that some famous companies had been suffered from it. The features of APT and the reason why traditional security defense architecture was failed were discussed. After tha...
Saved in:
Main Authors: | Dongxin Liu, Guorong Liu, Shuai Wang, Jun Shen, Huamin Jin |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2013-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2013.12.026/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
APT attack threat-hunting network model based on hypergraph Transformer
by: Yuancheng LI, et al.
Published: (2024-02-01) -
Review of threat discovery and forensic analysis based on system provenance graph
by: Tao LENG, et al.
Published: (2022-07-01) -
Evaluation of mimic defense strategy based on M-FlipIt game model
by: Shaohu DING, et al.
Published: (2020-07-01) -
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
by: Xiuzhang YANG, et al.
Published: (2022-06-01) -
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
by: Mingjie Ma, et al.
Published: (2014-07-01)