References
- B. De Decker, J. Dittmann, C. Kraetzer, and C. Vielhauer, Communications and Multimedia Security (LNCS 8099). Heidelberg: Springer, 2014.
- E. Cole, Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Waltham, MA: Syngress, 2013.
- L. Wang, M. Zhang, and A. Singhal, "Network security metrics: from known vulnerabilities to zero day attacks," in From Database to Cyber Security. Cham: Springer, 2018, pp. 450-469.
- B. Donohue, "What is APT?," 2013 [Online]. Available: https://www.kaspersky.com/blog/apt/2050/.
- P. Chen, L. Desmet, and C. Huygens, "A study on advanced persistent threats," in Communications and Multimedia Security. Heidelberg: Springer, 2014, pp. 63-72.
- FireEye Labs, "APT 30 and the mechanics of a long-running cyber espionage operation," 2015 [Online]. Available: https://www.fireeye.com/blog/threat-research/2015/04/apt_30_and_the_mecha.html.
- I. M. Chapman, S. P. Leblanc, and A. Partington, "Taxonomy of cyber attacks and simulation of their effects," in Proceedings of the 2011 Military Modeling & Simulation Symposium, Boston, MA, 2011, pp. 73-80.
- S. Hansman and R. Hunt, "A taxonomy of network and computer attacks," Computers & Security, vol. 24, no. 1, pp. 31-43, 2005. https://doi.org/10.1016/j.cose.2004.06.011
- C. A. Meyers, S. S. Powers, and D. M. Faissol, "Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches," Lawrence Livermore National Lab., Livermore, CA, Report No. LLNL-TR-419041, 2009.
- C. Simmons, C. Ellis, S. Shiva, D. Dasgupta, and Q. Wu, "AVOIDIT: a cyber attack taxonomy," in Proceedings of the 9th Annual Symposium on Information Assurance (ASIA'14), Albany, NY, 2014, pp. 2-12.
- B. Zhu, A. Joseph, and S. Sastry, "A taxonomy of cyber attacks on SCADA systems," in Proceedings of 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Dalian, China, 2011, pp. 380-388.
- E. M. Hutchins, M. J. Cloppert, and R. M. Amin, "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains," Leading Issues in Information Warfare & Security Research, vol. 1, no. 1, pp. 80-106, 2011.
- A. Lemay, J. Calvet, F. Menet, and J. M. Fernandez, "Survey of publicly available reports on advanced persistent threat actors," Computers & Security, vol. 72, pp. 26-59, 2018. https://doi.org/10.1016/j.cose.2017.08.005
- N. Virvilis and D. Gritzalis, "The big four-what we did wrong in advanced persistent threat detection?," in Proceedings of 2013 International Conference on Availability, Reliability and Security, Regensburg, Germany, 2013, pp. 248-254.
- M. Ussath, D. Jaeger, F. Cheng, and C. Meinel, "Advanced persistent threats: behind the scenes," in Proceedings of 2016 Annual Conference on Information Science and Systems (CISS), Princeton, NJ, 2016, pp. 181-186.
- T. Yadav and A. M. Rao, "Technical aspects of cyber kill chain," in Security in Computing and Communication. Cham: Springer, 2015, pp. 438-452.
- R. Derbyshire, B. Green, D. Prince, A. Mauthe, and D. Hutchison, "An analysis of cyber security attack taxonomies," in Proceedings of 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), London, UK, 2018, pp. 153-161.
- Dell SecureWorks Counter Threat Unit Threat Intelligence "Threat Group 3390 Cyberespionage," 2015 [Online]. Available: https://www.secureworks.com/research/threat-group-3390-targets-organizations-forcyberespionage?_ga=1.132970126.1294297346.1479934134.
- A. Chesla, "Cyber-security system and methods thereof," U.S. Patent 9565204, 2017.
- G. O'Gorman and G. McDonald, The Elderwood Project. Mountain View, CA: Symantec Corporation, 2012.
- M. Scott, "Clandestine Fox, Part Deux," 2014 [Online]. Available: https://www.fireeye.com/blog/threatresearch/2014/06/clandestine-fox-part-deux.html.
- Mandiant, "APT1: exposing one of China's cyber espionage units," 2013 [Online]. Available: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.
- C. Raiu, I. Soumenkov, K. Baumgartner, and V. Kamluk, "The MiniDuke mystery: PDF 0-day government spy assembler 0x29A micro backdoor," Kaspersky Lab, 2013 [Online]. Available: https://media.kasperskycontenthub.com/wp-content/uploads/sites/58/2013/03/21182654/themysteryofthepdf0-dayassemblermicrobackdoor.pdf.
- Novetta, "Operation SMN: Axiom Threat Actor Group Report," 2014 [Online]. Available: http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf.
- K. Scarfone and P. Mell, "Guide to Intrusion Detection and Prevention Systems (IDPS)," National Institute of Standards and Technology, Gaithersburg, MD, 2012.
- A. Fuchsberger, "Intrusion detection systems and intrusion prevention systems," Information Security Technical Report, vol. 10, no. 3, pp. 134-139, 2005. https://doi.org/10.1016/j.istr.2005.08.001
- F. Casino, K. K. R. Choo, and C. Patsakis, "HEDGE: efficient traffic classification of encrypted and compressed packets," IEEE Transactions on Information Forensics and Security, vol. 14, no. 11, pp. 2916-2926, 2019. https://doi.org/10.1109/TIFS.2019.2911156
- C. Raiu, "NetTraveler is back: the 'Red Star' APT returns with new tricks," 2013 [Online]. Available: https://securelist.com/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/57455/.
- Trend Micro Incorporated, "Spear-phishing email: most favored APT attack bait," 2012 [Online]. Available: https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishingemail-most-favored-apt-attack-bait.pdf.
- I. Ghafir, V. Prenosil, M. Hammoudeh, F. J. Aparicio-Navarro, K. Rabie, and A. Jabban, "Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat," in Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, 2018.
- K. Baumgartner and M. Golovkin, "The Naikon APT and the MsnMM campaigns," 2015 [Online]. Available: https://securelist.com/the-naikon-apt-and-the-msnmm-campaigns/70029/.
- M. Shahzad, M. Z. Shafiq, and A. X. Liu, "Large scale characterization of software vulnerability life cycles," IEEE Transactions on Dependable and Secure Computing, 2019. http://doi.org/10.1109/TDSC.2019. 2893950.
- L. Kharouni, F. Hacquebord, N. Huq, J. Gogolinski, F. Merces, A. Remorin, and D. Otis, "Operation pawn storm using decoys to evade detection," Trend Micro, 2014 [Online]. Available: https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf.
- ClearSky Cyber Security, Trend Micro, "Operation wilted tulip: exposing a cyber-espionage apparatus," 2017 [Online]. Available: https://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf.
- Kaspersky Lab, "Energetic Bear - Crouching Yeti," 2014 [Online]. Available: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08080817/EB-YetiJuly2014-Public.pdf.
- S. Doherty, J. Gegeny, B. Spasojevic, and J. Baltazar, "Hidden Lynx - professional hackers for hire," 2013 [Online]. Available: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf.
- Symantec Corporation, "The Waterbug attack group" 2016 [Online]. Available: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf.
- S. Shevchenko, "Agent.btz: a threat that hit pentagon," 2008 [Online]. Available: http://blog.threatexpert.com/2008/11/agentbtz-threat-that-hit-pentagon.html.
- Trend Micro Incoporated, "A look at the threats to air-gapped systems," 2017 [Online]. Available: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/a-look-at-the-threats-to-air-gappedsystems.
- M. Guri and D. Bykhovsky, "air-jumper: covert air-gap exfiltration/infiltration via security cameras & infrared (IR)," Computers & Security, vol. 82, pp. 15-29, 2019. https://doi.org/10.1016/j.cose.2018.11.004
- R. Benchea, C. Vatamanu, A. Maximciuc, and V. Luncasu, "APT28 under the scope," 2015 [Online]. Available: https://download.bitdefender.com/resources/media/materials/white-papers/en/Bitdefender_Indepth_analysis_of_APT28%E2%80%93The_Political_Cyber-Espionage.pdf.
- J. Calvet, "Sednit espionage group attacking air-gapped networks," 2014 [Online]. Available: https://www.welivesecurity.com/2014/11/11/sednit-espionage-group-attacking-air-gapped-networks/.
- Q. Do, B. Martini, and K. K. R. Choo, "The role of the adversary model in applied security research," Computers & Security, vol. 81, no. 156-181, 2018. https://doi.org/10.1016/j.cose.2018.12.002
- S. O'Malley and K. K. R. Choo, "Bridging the air gap: Inaudible data exfiltration by insiders," in Proceedings of the 20th Americas Conference on Information Systems (AMCIS), Savannah, GA, 2014, pp. 7-10.
- D. Creus T. Halfpop, and R. Falcone, "Sofacy's 'Komplex' OS X Trojan," 2016 [Online]. Available: https://unit42.paloaltonetworks.com/unit42-sofacys-komplex-os-x-trojan/.
- Kaspersky Lab, "The ProjectSauron APT," 2016 [Online]. Available: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07190156/The-ProjectSauron-APT_Technical_Analysis_KL.pdf.
- GReAT, "ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms," 2016 [Online]. Available: https://securelist.com/faq-the-projectsauron-apt/75533/.
- R. S. Ross, "Managing information security risk: organization, mission, and information system view," National Institute of Standards and Technology, Gaithersburg, MD, 2011.
- FireEye Labs, "Less than zero: a survey of zero-day attacks in 2013 and what they say about the traditional security model," 2013 [Online]. Available: https://www.fireeye.jp/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-zero-day-attacks-in-2013.pdf.
- L. Ablon and A. Bogart, Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits. Santa Monica, CA: Rand Corporation, 2017.
- L. Bilge and T. Dumitras, "Before we knew it: an empirical study of zero-day attacks in the real world," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 833-844.
- N. Moran and M. Oppenheim, "Darwin's Favorite APT Group," 2014 [Online]. Available: https://www.fireeye.com/blog/threat-research/2014/09/darwins-favorite-apt-group-2.html.
- V. Kotov and F. Massacci, "Anatomy of exploit kits," in Engineering Secure Software and Systems. Heidelberg: Springer, 2013, pp. 181-196.
- Kaspersky Lab, "Exploits: how great is the threat?," 2017 [Online]. Available: https://securelist.com/exploitshow-great-is-the-threat/78125/.
- Minerva Labs and ClearSky Cyber Security, "CopyKittens Attack Group," 2015 [Online]. Available: https://s3-eu-west-1.amazonaws.com/minervaresearchpublic/CopyKittens/CopyKittens.pdf.
- Symantec Corporation, "The increased use of powershell in attacks," 2016 [Online]. Available: https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-inattacks-16-en.pdf.
- N. Villeneuve, J. T. Bennett, N. Moran, T. Haq, M. Scott, and K. Geers, "Operation 'KE3CHANG': Targeted Attacks against Ministries of Foreign Affairs," 2014 [Online]. Available: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-ke3chang.pdf.
- FireEye Lab, "Operation DeputyDog: Zero-Day (CVE-2013-3893) attack against Japanese targets," 2013 [Online]. Available: https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-daycve-2013-3893-attack-against-japanese-targets.html.
- J. Miller-Osborn, "Credential-based attacks: exposing the ecosystem and motives behind credential phishing, theft and abuse," 2017 [Online]. Available: https://www.paloaltonetworks.com/resources/research/unit-42-credential-based-attacks.
- Dell SecureWorks Counter Threat Unit Threat Intelligence, "Hacker group creates network of fake LinkedIn profiles," 2015 [Online]. Available: https://www.secureworks.com/research/suspected-iran-based-hackergroup-creates-network-of-fake-linkedin-profiles.
- FireEye iSIGHT Intelligence, "APT28: at the center of the storm," 2017 [Online]. Available: https://www.fireeye.com/blog/threat-research/2017/01/apt28_at_the_center.html.
- D. Alperovitch, "Bears in the Midst: intrusion into the Democratic National Committee," 2016 [Online]. Available: https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/.
- C. Missaoui, S. Bachouch, I. Abdelkader, and S. Trabelsi, "Who is reusing stolen passwords? An empirical study on stolen passwords and countermeasures," in Cyberspace Safety and Security. Cham: Springer, 2018, pp. 3-17.
- M. S. Webb, "Evaluating tool based automated malware analysis through persistence mechanism detection," Ph.D. dissertation, Kansas State University, Manhattan, KS, 2018.
- N. Moran, S. Omkar Vashisht, M. Scott, and T. Haq, "Operation ephemeral hydra: IE Zero-Day linked to DeputyDog uses diskless method," 2013 [Online]. Available: https://www.fireeye.com/blog/threat-research/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html.
- Y. M. Wang, R. Roussev, C. Verbowski, A. Johnson, M. W. Wu, Y. Huang, and S. Y. Kuo, "Gatekeeper: monitoring auto-start extensibility points (ASEPs) for spyware management," in Proceedings of the 18th Large Installation System Administration Conference (LISA), Atlanta, GA, 2004, pp. 33-46.
- N. Miloslavskaya, "Remote attacks taxonomy and their verbal indicators," Procedia Computer Science, vol. 123, pp. 278-284, 2018. https://doi.org/10.1016/j.procs.2018.01.043
- Symantec Corporation, ""Forkmeiamfamous": Seaduke, latest weapon in the Duke armory," 2015 [Online]. Available: https://www.symantec.com/connect/blogs/forkmeiamfamous-seaduke-latest-weapon-duke-armory.
- B. E. Strom, J. A. Battaglia, M. S. Kemmerer, W. Kupersanin, D. P. Miller, C. Wampler, S. M. Whitley, and R. D. Wolf, "Finding cyber threats with ATT&CK-based analytics," The MITRE Corporation, Bedford, MA, Technical Report No. MTR170202, 2017.
- McAfee Labs, "Global energy cyberattacks: 'Night Dragon'," 2011 [Online]. Available: https://securingtomorrow.mcafee.com/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf.
- A. Hosseini, "Ten process injection techniques: a technical survey of common and trending process injection techniques," 2017 [Online]. Available: https://www.endgame.com/blog/technical-blog/ten-process-injectiontechniques-technical-survey-common-and-trending-process.
- Microsoft, "Working with the AppInit DLLs registry value," 2018 [Online]. Available: https://support.microsoft.com/en-us/help/197571/working-with-the-appinit-dlls-registry-value.
- M-Lab, "DLL search order hijacking revisited," 2010 [Online]. Available: https://www.fireeye.com/blog/threat-research/2010/08/dll-search-order-hijacking-revisited.html.
- Microsoft, "Dynamic-link library search order," 2018 [Online]. Available: https://docs.microsoft.com/engb/windows/win32/dlls/dynamic-link-library-search-order.
- S. Narang, "Backdoor.Barkiofork targets aerospace and defense industry," 2013 [Online]. Available: https://www.symantec.com/connect/blogs/backdoorbarkiofork-targets-aerospace-and-defense-industry.
- Symantec Corporation, "Backdoor.Barkiofork," 2013 [Online]. Available: https://www.symantec.com/security-center/writeup/2012-042403-0432-99.
- A. Stewart, "DLL side-loading: a thorn in the side of the anti-virus industry," 2016 [Online]. Available: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf.
- Dell SecureWorks Counter Threat Unit Threat Intelligence, "Threat Group 3390 cyberespionage," 2015 [Online]. Available: https://www.secureworks.com/research/threat-group-3390-targets-organizations-forcyberespionage?_ga=1.132970126.1294297346.1479934134.
- J. Grunzweig, "Unit 42 Technical Analysis: Seaduke," 2015 [Online]. Available: https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/.
- G Data SecurityLabs, "COM Object hijacking: the discreet way of persistence," 2014 [Online]. Available: https://www.gdatasoftware.com/blog/2014/10/23941-com-object-hijacking-the-discreet-way-of-persistence.
- ESET, "En route with Sednit," 2016 [Online]. Available: https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part1.pdf.
- V. Rusakov and S. Golovanov "Attacks before system startup," 2014 [Online]. Available: https://securelist.com/attacks-before-system-startup/63725/.
- J. Gardiner, M. Cova, and S. Nagaraja, "Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences," 2014 [Online]. Available: https://arxiv.org/abs/1408.1136.
- D. Chiu, S. H. Weng, and J. Chiu, "Backdoor use in targeted attacks," Trend Micro Incorporated, Irving, TX, 2014.
- S. Shafieian, D. Smith, and M. Zulkernine, "Detecting DNS tunneling using ensemble learning," in Network and System Security. Cham: Springer, 2017, pp. 112-127.
- S. Tanase, "Satellite Turla: APT command and control in the sky," 2015 [Online]. Available: https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/.
- J. Power, "Mind the gap: are air-gapped systems safe from breaches?," 2014 [Online]. Available: https://www.symantec.com/connect/blogs/mind-gap-are-air-gapped-systems-safe-breaches.
- Symantec Corporation, "Flamer: highly sophisticated and discreet threat targets the Middle East," 2012 [Online]. Available: https://www.symantec.com/connect/blogs/flamer-highly-sophisticated-and-discreetthreat-targets-middle-east.
- Microsoft, "Featured intelligence (Microsoft Security Intelligence Report Volume 19)," 2015 [Online]. Available: https://download.microsoft.com/download/4/4/C/44CDEF0E-7924-4787-A56A-16261691ACE3/Microsoft_Security_Intelligence_Report_Volume_19_English.pdf