Show simple item record

dc.contributor.authorLehto, Martti
dc.contributor.editorGriffin, Robert P.
dc.contributor.editorTatarand, Unal
dc.contributor.editorYankson, Benjamin
dc.date.accessioned2022-03-15T07:11:40Z
dc.date.available2022-03-15T07:11:40Z
dc.date.issued2022
dc.identifier.citationLehto, M. (2022). APT Cyber-attack Modelling : Building a General Model. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), <i>ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security</i> (17, pp. 121-129). Academic Conferences International Ltd. The proceedings of the 17th international conference on cyber warfare and security. <a href="https://doi.org/10.34190/iccws.17.1.36" target="_blank">https://doi.org/10.34190/iccws.17.1.36</a>
dc.identifier.otherCONVID_104593525
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/80120
dc.description.abstractThe global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early warning ability. Threats in cyberspace are difficult to define, as it is hard to identify the source of attacks and the motives that drive them, or even to foresee the course of an attack as it unfolds. The identification of cyber threats is further complicated by the difficulty in defining the boundaries between national, international, public, and private interests. Because threats in cyberspace are global in nature and involve rapid technological developments, the struggle to respond them is ever-changing and increasingly complicated. Cyber-attack models describe the structure of an attack in different phases. They provide a means to conceptualize the different aspects and elements of an attack. However, it is important to understand that not all attacks must complete all phases to be successful, and the objective of the attack defines the structure of the attack. Different actors have built different cyber-attack models. Modeling is used to understand the different goals of cyber attackers. Attack models are based on attack targets and attack objectives. This paper analyzes different APT cyber-attack models and presents a general cyber-attack model.en
dc.format.extent645
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the 17th international conference on cyber warfare and security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othercyber-attack model
dc.subject.otherAPT attack
dc.subject.othercyber security
dc.titleAPT Cyber-attack Modelling : Building a General Model
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202203151824
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-26-9
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange121-129
dc.relation.issn2048-9870
dc.relation.numberinseries1
dc.relation.volume17
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 International Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysokyberrikollisuus
dc.subject.ysotietoturva
dc.subject.ysoverkkohyökkäykset
dc.subject.ysotietoverkkorikokset
dc.subject.ysovarautuminen
dc.subject.ysomallintaminen
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p29491
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p27938
jyx.subject.urihttp://www.yso.fi/onto/yso/p22460
jyx.subject.urihttp://www.yso.fi/onto/yso/p3533
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/iccws.17.1.36
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0