Skip to main content

2020 | OriginalPaper | Buchkapitel

Attack Vectors and Advanced Persistent Threats

verfasst von : Sergio F. de Abreu, Stefan Kendzierskyj, Hamid Jahankhani

Erschienen in: Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Advanced Persistent Threats (APTs) are destructive and malicious cyberattacks aimed at high profile, high value targets with clear objectives in mind with a range of desired outputs. In most cases, these threat groups are state sponsored which makes them extremely well financed, organised and resourced. The attack payloads range from data exfiltration and theft to the undermining of critical national infrastructure. These attacks differ from the typical cyberattacks in several different ways but a key differentiation is their patient “low and slow” approach to prevent detection. This approach, although slow, has been very successful and in many cases, detection is years after initial infection. Many of the attacks detected today, have been over a decade in the making. Most concerning is the fact that traditional defence mechanisms have been unsuccessful at detecting these attacks and so how successful will these methods be against a new generation of attacks? The earliest recording of an APT is probably “the cuckoo’s egg”. An attack in the 1980s in which a West German hacker infiltrated a series of computers in California and over time stole state secrets relating to the US “Star Wars” program. The hacker then sold the information to the Soviet KGB. Although at this point in time, cyber defence was not a government sponsored military department, it raised awareness of just how powerful this threat could be. Since then, worldwide attacks in the private and public sectors have grown exponentially and today, all governments have cyber warfare units.
Most APT attacks are state sponsored; however, this does not mean that attacks are limited to government entities. Far from it. These attacks affect individuals, companies, corporations and governments globally. Attacks can and do encompass a multitude of sophisticated techniques and affect not only the traditional LAN/WAN environments but could also contaminate new generation networks such as mobile 5G networks, vehicular ad hoc networks (VANET) and Internet of Things (IoT) to name but a few. Dealing with these attacks is challenging, most attacks take years to be discovered and traditional detection mechanisms have been woefully inadequate. The age of machine learning and artificial intelligence has brought significant improvement to the detection challenges faced. These fields allow us to look for far more than attack signatures and characteristics. They allow us to look for patterns of behaviour through massive data quantities at speeds previously unimaginable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Ben-Asher N, Gonzalez C (2015) Training for the unknown: the role of feedback and similarity in detecting zero-day attacks. Proc Manuf 3:1088–1095 Ben-Asher N, Gonzalez C (2015) Training for the unknown: the role of feedback and similarity in detecting zero-day attacks. Proc Manuf 3:1088–1095
3.
Zurück zum Zitat Bhatt P, Yano E, Gustavsson P (2014) Towards a framework to detect multi-stage advanced persistent threats attacks. In: 2014 IEEE 8th international symposium on service oriented system engineering Bhatt P, Yano E, Gustavsson P (2014) Towards a framework to detect multi-stage advanced persistent threats attacks. In: 2014 IEEE 8th international symposium on service oriented system engineering
4.
Zurück zum Zitat Brewer R (2014) Advanced persistent threats: minimising the damage. Netw Secur 2014(4):5–9CrossRef Brewer R (2014) Advanced persistent threats: minimising the damage. Netw Secur 2014(4):5–9CrossRef
6.
Zurück zum Zitat Chen P, Desmet L, Huygens C (2014) A study on advanced persistent threats. In: Communications and multimedia security. Springer, Aveiro, pp 63–72 Chen P, Desmet L, Huygens C (2014) A study on advanced persistent threats. In: Communications and multimedia security. Springer, Aveiro, pp 63–72
9.
Zurück zum Zitat Ferrer Z, Cebrian Ferrer M (2016) In-depth analysis of Hydraq – in-depth_analysis _of_hydraq_final_231538.pdf. [online] Paper.seebug.org. Available at https://paper. seebug.org/papers/APT/APT_CyberCriminal_Campagin/2010/in-depth_analysis_of_ hydraq_final_231538.pdf. Accessed 6 Sept 2019 Ferrer Z, Cebrian Ferrer M (2016) In-depth analysis of Hydraq – in-depth_analysis _of_hydraq_final_231538.pdf. [online] Paper.​seebug.​org. Available at https://​paper.​ seebug.org/papers/APT/APT_CyberCriminal_Campagin/2010/in-depth_analysis_of_ hydraq_final_231538.pdf. Accessed 6 Sept 2019
14.
Zurück zum Zitat Hussain M, Wahab A, Idris Y, Ho A, Jung K (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66CrossRef Hussain M, Wahab A, Idris Y, Ho A, Jung K (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66CrossRef
16.
Zurück zum Zitat Jiang D, Omote K (2015) An approach to detect remote access Trojan in the early stage of communication. In: 2015 IEEE 29th international conference on advanced information networking and applications Jiang D, Omote K (2015) An approach to detect remote access Trojan in the early stage of communication. In: 2015 IEEE 29th international conference on advanced information networking and applications
22.
Zurück zum Zitat Marchetti M, Pierazzi F, Colajanni M, Guido A (2016) Analysis of high volumes of network traffic for advanced persistent threat detection. Comput Netw 109:127–141CrossRef Marchetti M, Pierazzi F, Colajanni M, Guido A (2016) Analysis of high volumes of network traffic for advanced persistent threat detection. Comput Netw 109:127–141CrossRef
25.
Zurück zum Zitat Mokube I, Adams M (2007) Proceedings of the 45th annual southeast regional conference. ACM, New York, pp 321–326CrossRef Mokube I, Adams M (2007) Proceedings of the 45th annual southeast regional conference. ACM, New York, pp 321–326CrossRef
27.
Zurück zum Zitat Paredes-Oliva I, Castell-Uroz I, Barlet-Ros P, Dimitropoulos X, Sole-Pareta J (2012) Practical anomaly detection based on classifying frequent traffic patterns. In: 2012 Proceedings IEEE INFOCOM workshops Paredes-Oliva I, Castell-Uroz I, Barlet-Ros P, Dimitropoulos X, Sole-Pareta J (2012) Practical anomaly detection based on classifying frequent traffic patterns. In: 2012 Proceedings IEEE INFOCOM workshops
28.
Zurück zum Zitat Raman D, De Sutter B, Coppens B, Volckaert S, De Bosschere K, Danhieux P, Van Buggenhout E (2013) DNS tunneling for network penetration. In: Lecture notes in computer science. Springer, Cham, pp 65–77 Raman D, De Sutter B, Coppens B, Volckaert S, De Bosschere K, Danhieux P, Van Buggenhout E (2013) DNS tunneling for network penetration. In: Lecture notes in computer science. Springer, Cham, pp 65–77
30.
Zurück zum Zitat Scaife N, Carter H, Traynor P, Butler K (2016) CryptoLock (and Drop It): stopping ransomware attacks on user data. In: 2016 IEEE 36th international conference on distributed computing systems (ICDCS) Scaife N, Carter H, Traynor P, Butler K (2016) CryptoLock (and Drop It): stopping ransomware attacks on user data. In: 2016 IEEE 36th international conference on distributed computing systems (ICDCS)
31.
Zurück zum Zitat Siddiqui S, Khan M, Ferens K, Kinsner W (2016) Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 ACM on international workshop on security and privacy analytics – IWSPA’16 Siddiqui S, Khan M, Ferens K, Kinsner W (2016) Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 ACM on international workshop on security and privacy analytics – IWSPA’16
32.
Zurück zum Zitat Sokol P, Míšek J, Husák M (2017) Honeypots and honeynets: issues of privacy. EURASIP J Inf Secur 2017(1):1–9CrossRef Sokol P, Míšek J, Husák M (2017) Honeypots and honeynets: issues of privacy. EURASIP J Inf Secur 2017(1):1–9CrossRef
33.
Zurück zum Zitat Spitzner L (2002) Honeypots: tracking hackers. Addison-Wesley, Boston Spitzner L (2002) Honeypots: tracking hackers. Addison-Wesley, Boston
34.
Zurück zum Zitat Virvilis N, Gritzalis D (2013) The big four – what we did wrong in advanced persistent threat detection? In: 2013 international conference on availability, reliability and security Virvilis N, Gritzalis D (2013) The big four – what we did wrong in advanced persistent threat detection? In: 2013 international conference on availability, reliability and security
Metadaten
Titel
Attack Vectors and Advanced Persistent Threats
verfasst von
Sergio F. de Abreu
Stefan Kendzierskyj
Hamid Jahankhani
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-35746-7_13