International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 141 - Number 13 |
Year of Publication: 2016 |
Authors: Murtaza A. Siddiqi, Naveed Ghani |
10.5120/ijca2016909784 |
Murtaza A. Siddiqi, Naveed Ghani . Critical Analysis on Advanced Persistent Threats. International Journal of Computer Applications. 141, 13 ( May 2016), 46-50. DOI=10.5120/ijca2016909784
Since the birth of Internet, cyber securities have always been an area full of unsolved problems for researchers. Particularly in the age of information, every corporate and government site needs to keep their sensitive data secure from hackers or intruders. With rapid advancement in improved security measures, there always comes along a threat which forces researchers to be on alert. In recent times “Advanced Persistent Threat” (APT) has been among the most highlighted threat for security experts. At early stages such attacks were dedicated to government or financial organizations, but recent studies based on security breaches indicate that such attacks are now carried out on a much wider domain. In this paper crucial attack stages with the most common methods and tools use by intruders to initiate APTs are discussed, along with recommendation on how a model can be defined to perceive an APT attack being conducted on a network.