Recently, many Advanced Persistent Threats (APTs) have emerged. APTs persistently collect information and data on a specific target using diverse attack techniques, examine the vulnerabilities of the target, and then carry out hacking using the data and examination result. An APT is very intelligent, as it selects a clear target and carries out specific attacks, unlike traditional hacking attempts. The APT has a very precise attack type because it employs indirect attacks on the terminals of the employees working for the target, as well as direct attacks. For this reason, it is very difficult to detect and handle an APT. In this paper, the recent attack methods used by APTs are described, and the attack pattern is analyzed to propose efficient countermeasures for preventing and handling APTs.
[1]
Minglu Li,et al.
Advanced Web and Network Technologies, and Applications
,
2006
.
[2]
Rafal Rohozinski,et al.
Stuxnet and the Future of Cyber War
,
2011
.
[3]
Dongho Won,et al.
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment
,
2006,
APWeb Workshops.
[4]
T. M. Chen,et al.
Stuxnet, the real start of cyber warfare? [Editor's Note]
,
2010,
IEEE Netw..
[5]
Namje Park.
Implementation of terminal middleware platform for mobile RFID computing
,
2011,
Int. J. Ad Hoc Ubiquitous Comput..