Research on APT and its Secrutiy Protection

Article Preview

Abstract:

Advanced persistent threat (APT) has become a serious chanllenge to network security in recent yeas. Characteristics of this kind of network attack involve purposiveness,concealment,sustainability and variability, and it is hard to protect for critical infrastructure, financial systems, elements of national power, etc. These threats range from unwitting hackers to nation-states, each at various levels of competence. For performing security protection, five typical cases of APT including Night Dragon attack, Google Operation Aurora, RSA SecurID attack, Stuxnet attack and Shady Rat attack were analyzed. Its commonly attack process and technology characteristics are summarized. Finally, some suggestions and opinions on secrutiy protection were presented.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4970-4973

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Li Zhan-bao. The Perspective of Stuxnet Virus [C]. National Conference of Computer Security Science. 2011 26(9) 230-232.

Google Scholar

[2] Gao XiaoYan. Deceiving Technology Research of Attack and Defence in Network Security [J]. Journal of ZhengZhou Economics & Management Institute. 2006 21(1) 84-86.

Google Scholar

[3] Liu Xing, Zhao Min. Offense and Defense Technology in Cyberwar — Analysis on Project Suter [J]. Command Information System and Technology. 2011 2(4) 1-9.

Google Scholar

[4] Report on the Worm Stuxnet's Attack, Published by Antiy CERT, V3. 1 2010-09. 29.

Google Scholar

[5] Wu Mo-ping. Challenge of military information security and its countereasure [J]. Journal of Daliam Naval Academy. 2004 27(1) 9-11.

Google Scholar

[6] CHEN Jian-feng, WANG Qiang, WU Miao. Network-based APT Attack and Defense Strategies [J]. Information Security and Communications Privacy. 2012 (7) 24-27.

Google Scholar

[7] XU Ting. A Hierarchical-centralized Network Security Architecture Effectively Preventing APT attacks [J]. Academic Research. 2013 (6) 65-67.

Google Scholar