A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
Abstract
References
Index Terms
- A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
Recommendations
Combating advanced persistent threats
An advanced persistent threat (also known as APT) is a deliberately slow-moving cyberattack that is applied to quietly compromise interconnected information systems without revealing itself. APTs often use a variety of attack methods to get unauthorized ...
Detection of advanced persistent threat using machine-learning correlation analysis
AbstractAs one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain ...
A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic
Advanced Persistent Threat (APT) is a dangerous network attack method that is widely used by attackers nowadays. During the APT attack process, attackers often use advanced techniques and tools, thus, causing many difficulties for information security ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Computing Surveys](/cms/asset/34786190-d6ef-4a60-b68a-1db39e094f51/3697147.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Survey
Funding Sources
- National Natural Science Foundation of China
- Open Foundation of the State Key Laboratory of Integrated Services Networks
- Postdoctoral Fellowship Program of CPSF
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 547Total Downloads
- Downloads (Last 12 months)547
- Downloads (Last 6 weeks)106
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in