A Study on Advanced Persistent Threat


Cinar C., ALKAN M., Dorterler M., DOĞRU İ. A.

3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosnia And Herzegovina, 20 - 23 September 2018, pp.116-121, (Full Text) identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume:
  • Doi Number: 10.1109/ubmk.2018.8566348
  • City: Sarajevo
  • Country: Bosnia And Herzegovina
  • Page Numbers: pp.116-121
  • Keywords: Advanced Persistent Threat, targetted attacks, sophisticated cyber attack, cyber security
  • Gazi University Affiliated: Yes

Abstract

Information is the most valuable asset and the most important power of our time, thus it fosters the desire of malicious people to access information through non-legal means. Advanced Persistent Threat (APT) has emerged as a result of this desire. This cyber-attack method became widespread over time and started to be used as a means of financial motivated attack which was initially used by governments. APTs are silent and effective attacks and the damage they make to institutions, organizations and people is great. In this study, APTs are defined and their properties are briefed. The methods and techniques that can be used during these attacks are explained by drawing a life model. The measures that could be taken have been presented by examining the works conducted to prevent this attack. Therefore It is aimed to increase the awareness of the people.