Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
The shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, e...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | http://eprints.usm.my/59238/1/24%20Pages%20from%20NACHAAT%20ABDELATIF%20ALI%20MOHAMED%20-%20TESIS.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-usm-ep.59238 |
---|---|
record_format |
uketd_dc |
spelling |
my-usm-ep.592382023-08-24T00:03:45Z Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique 2022-04 Ali Mohamed, Nachaat Abdelatif QA75.5-76.95 Electronic computers. Computer science The shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. Current security measures of addressing APT attack involve detecting the attacks long after it has happened and failed to provide proactive responses. The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem. 2022-04 Thesis http://eprints.usm.my/59238/ http://eprints.usm.my/59238/1/24%20Pages%20from%20NACHAAT%20ABDELATIF%20ALI%20MOHAMED%20-%20TESIS.pdf application/pdf en public phd doctoral Perpustakaan Hamzah Sendut Pusat Pengajian Sains Komputer |
institution |
Universiti Sains Malaysia |
collection |
USM Institutional Repository |
language |
English |
topic |
QA75.5-76.95 Electronic computers Computer science |
spellingShingle |
QA75.5-76.95 Electronic computers Computer science Ali Mohamed, Nachaat Abdelatif Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique |
description |
The shift from the manual approach of processing data to the digitized method
has made organizational data prone to various attacks by cybercriminals. Advanced
Persistent Threat (APT) is a recent threat that has ravaged many industries and
governments. APT causes enormous damages for data loss, espionage, sabotage, leak,
or forceful pay of ransom money to the attackers. Current security measures of
addressing APT attack involve detecting the attacks long after it has happened and
failed to provide proactive responses. The current security solutions are deployed to
detect APT signature and behaviour after APT bypasses the entire protections and
accomplishes lateral movement technique, which makes the current solutions
ineffective to resolve APT problem. |
format |
Thesis |
qualification_name |
Doctor of Philosophy (PhD.) |
qualification_level |
Doctorate |
author |
Ali Mohamed, Nachaat Abdelatif |
author_facet |
Ali Mohamed, Nachaat Abdelatif |
author_sort |
Ali Mohamed, Nachaat Abdelatif |
title |
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique |
title_short |
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique |
title_full |
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique |
title_fullStr |
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique |
title_full_unstemmed |
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique |
title_sort |
rule-based approach for detecting advanced persistent threat using behavioral features of credential dumping technique |
granting_institution |
Perpustakaan Hamzah Sendut |
granting_department |
Pusat Pengajian Sains Komputer |
publishDate |
2022 |
url |
http://eprints.usm.my/59238/1/24%20Pages%20from%20NACHAAT%20ABDELATIF%20ALI%20MOHAMED%20-%20TESIS.pdf |
_version_ |
1776101269697462272 |