首页> 外文OA文献 >Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats
【2h】

Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats

机译:网络攻击线程:基于控制流的解构和解决方法   缓解网络威胁

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Attacks in cyberspace have got attention due to risk at privacy, breach oftrust and financial losses for individuals as well as organizations. In recentyears, these attacks have become more complex to analyze technically, as wellas to detect and prevent from accessing confidential data. Although there aremany methodologies and mechanisms which have been suggested for cyber-attackdetection and prevention, but not from the perspective of an attacker. Thispaper presents the cyber-defence as hindrances, faced by the attacker, byunderstanding attack thread and defence possibilities with existing securitymechanisms. Seven phases of Cyber Attack Thread are introduced and technicalaspects are discussed with reference to APT attacks. The paper aims forsecurity practitioner and administrators as well as for the general audience tounderstand the attack scenario and defensive security measures.
机译:由于隐私风险,对个人和组织的信任破坏和财务损失,对网络空间的攻击已引起关注。近年来,这些攻击在技术上进行分析以及检测和阻止访问机密数据变得更加复杂。尽管已经提出了许多用于网络攻击检测和预防的方法和机制,但是并不是从攻击者的角度出发。本文通过了解攻击线程和现有安全机制的防御可能性,将网络防御视为攻击者面临的障碍。介绍了网络攻击线程的七个阶段,并参考APT攻击讨论了技术方面。本文旨在使安全从业人员和管理员以及一般读者了解攻击情形和防御性安全措施。

著录项

代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号