Publication:
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique

dc.contributor.authorAli Mohamed, Nachaat Abdelatif
dc.date.accessioned2023-08-24T07:13:34Z
dc.date.available2023-08-24T07:13:34Z
dc.date.issued2022-04
dc.description.abstractThe shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. Current security measures of addressing APT attack involve detecting the attacks long after it has happened and failed to provide proactive responses. The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.
dc.identifier.urihttps://erepo.usm.my/handle/123456789/17410
dc.subjectRule-Based Approach For Detecting Advanced Persistent Threat
dc.subjectUsing Behavioral Features Of Credential Dumping Technique
dc.titleRule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
dc.typeResource Types::text::thesis::doctoral thesis
dspace.entity.typePublication
oairecerif.author.affiliationUniversiti Sains Malaysia
Files
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: