Survey of attack and detection based on the full life cycle of APT
The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized. Based on this, a more general APT full lifecycle...
Saved in:
| Main Authors: | WANG Zhiwei, HE Xijie, YI Xin, LI Ziyang, CAO Xudong, YIN Tao, LI Shuhao, FU Anmin, ZHANG Yuqing |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2024-09-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024128/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimal active defense decision model of wireless communication network under APT attack
by: Meng MENG, et al.
Published: (2024-02-01) -
Optimal active defense decision model of wireless communication network under APT attack
by: Meng MENG, et al.
Published: (2024-02-01) -
Multi-stage detection method for APT attack based on sample feature reinforcement
by: Lixia XIE, et al.
Published: (2022-12-01) -
Multi-stage detection method for APT attack based on sample feature reinforcement
by: Lixia XIE, et al.
Published: (2022-12-01) -
Public media lobbying: the case of APTS
by: Christopher Ali, et al.
Published: (2025-05-01)