LEADER |
02146nam a22002777a 4500 |
001 |
1773160 |
024 |
|
|
|3 10.36621/0397-005-985-005
|
041 |
|
|
|a eng
|
044 |
|
|
|b الأردن
|
100 |
|
|
|9 561465
|a Al-Sit, Waleed
|e Author
|
245 |
|
|
|a Analysis of Advanced Persistent Threats (APT)
|
260 |
|
|
|b جامعة الحسين بن طلال - عمادة البحث العلمي والدراسات العليا
|c 2019
|
300 |
|
|
|a 60 - 73
|
336 |
|
|
|a بحوث ومقالات
|b Article
|
520 |
|
|
|b Despite the large numbers of malware programs, Advanced Persistent Threat (APT) has an appreciable impact in attack environment nowadays. APT is a deliberately cyber-attack that is utilized to target specific and sensitive information in systems without revealing itself. APTs usually use several methods of attack to have possibility of unauthorized access to system and get the targeted information. This survey studies and analysis three types of attack model and consider the attack pyramid as the model of APTs attack. Also, we present a detection framework as well as the methodology of its implementation. The method proposes to use the MapReduce operation to evaluate all the possible events and context where the attack might take place. The results show that using these methods will improve the performance as well as reduce the overall load.
|
653 |
|
|
|a حماية الشبكات
|a أمن الشبكات
|a الأمن الرقمى
|a القرصنة
|a أمن البيانات
|
692 |
|
|
|b Network Security
|b Advanced Persistent Threats
|b APT Detection
|
773 |
|
|
|4 العلوم الإنسانية ، متعددة التخصصات
|6 Humanities, Multidisciplinary
|c 005
|f Mağallaẗ Ğāmiʿaẗ al-Ḥusayn bin Ṭalāl li-l-buḥūṯ
|l 985
|m مج5, ملحق
|o 0397
|s مجلة جامعة الحسين بن طلال للبحوث
|t Al - Hussein Bin Talal University Journal of Research
|v 005
|x 2519-7436
|
700 |
|
|
|9 561466
|a Al-Zoubi, Hani
|e Co-Author
|
700 |
|
|
|9 414199
|a Qtaishat, Khaldoun
|e Co-Author
|
856 |
|
|
|u 0397-005-985-005.pdf
|
930 |
|
|
|d y
|p y
|q n
|
995 |
|
|
|a EduSearch
|
995 |
|
|
|a AraBase
|
995 |
|
|
|a HumanIndex
|
999 |
|
|
|c 1035861
|d 1035861
|