Detection of Confidentiality Violation by Short Term Advanced Persistent Threats based on Data Stream Correlation, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Advanced Persistent Threats (APTs) by multi step , low-level and sometimes slowmoving behaviors try to hiding malicious behaviors. These attacks are complex, costly and the attacker violates the security policy explicitly or implicitly by distributing his or her behavior to multi agents and infiltrate trusted subjects. One of the challenges is the discovery of these attacks in the early stages of the attack and before the complete violation of confidentiality. the lack of deep intercepting of events, content with intrusion detection systems warnings, the lack of simultaneous tracking of host and network-level events and the lack of real-time processing is limitations of existing detection...
Cataloging briefDetection of Confidentiality Violation by Short Term Advanced Persistent Threats based on Data Stream Correlation, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Advanced Persistent Threats (APTs) by multi step , low-level and sometimes slowmoving behaviors try to hiding malicious behaviors. These attacks are complex, costly and the attacker violates the security policy explicitly or implicitly by distributing his or her behavior to multi agents and infiltrate trusted subjects. One of the challenges is the discovery of these attacks in the early stages of the attack and before the complete violation of confidentiality. the lack of deep intercepting of events, content with intrusion detection systems warnings, the lack of simultaneous tracking of host and network-level events and the lack of real-time processing is limitations of existing detection...
Find in contentBookmark
|
|