Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
Abstract
:1. Introduction
- Some of the detection solutions lack APT detection for every stage of the attack life cycle. Work done by Mohammad and Belaton [13] focused on the credential dumping technique through monitoring CPU, RAM, Windows Registry, and file systems in order to detect APT. However, the authors only focused on one stage of the APT (credential access stage) and did not provide a comprehensive solution to detect APTs in all stages of the APT life cycle.
- Some of the detection solutions are inefficient in detecting APTs. Luh et al. [15] have proposed AIDIS, an Advanced Intrusion Detection and Interpretation System for APT detection and classification using Machine Learning techniques. However, this solution may not be capable of early detection of APTs.
- Most APT detection solutions only focused on a group of users instead of individual user protection. Indeed, the risk associated with each device’s behavior varies according to the user’s behavior [18].
- Most APT detection solutions fail to adopt any cyber security framework such as the National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO) [19]. These detection solutions are not comprehensive to detect APT. NIST is an example of a cyber-security framework [20]. It categorizes the cybersecurity capabilities into five core functions (Identify, Protect, Detect, Respond, and Recovery) to organize and improve the cybersecurity models [20]. Based on NIST, most solutions fail to include the identify stage, which means the existing APT detection solutions are unable to quantify the risk related to the vulnerabilities of the attack. In addition, these APT solutions fail to include the protection stage as these solutions do not provide a function to prevent data leakage [21] or APT lateral movement [22].
2. Background
2.1. Advanced Persistent Threat (APT)
2.1.1. A Formal Definition of Advanced Persistent Threat
2.1.2. Characteristics of Advanced Persistent Threats
2.1.3. Advanced Persistent Threat Process
- Initial Access—The APT attack initially accesses the system using spear phishing with malicious executables that impersonate chat application updates such as Facebook, WhatsApp, and Messenger, in addition to applications that target Middle Eastern countries using the “Masquerade as Legitimate Application” technique;
- Defense Evasion—After successfully accessing the targeted system, FrozenCell downloads and installs additional applications using the “Download New Code at Runtime” technique and establishes communication with a command and control (C&C) server controlled by APT attackers;
- Credential Access—FrozenCell reads SMS messages and retrieves account information for other applications using “Access Stored Application Data and Capture SMS Messages” techniques;
- Discovery—FrozenCell conducts a search about pdf, doc, docx, ppt, pptx, xls, and xlsx file types using the “File and Directory Discovery” technique. In addition, geolocation services for mobile towers are utilized by FrozenCell to track targets via the “Location Tracking” technique. Furthermore, FrozenCell captures the device manufacturer, model, and serial number, as well as phone information such as cell location, mobile country code (MCC), and mobile network code (MNC) using “System Information Discovery and System Network Configuration Discovery” techniques;
- Collection—FrozenCell gathers the required information such as application account information, recorded calls, SMS messages, device images, and the location of the target;
- Exfiltration—FrozenCell compresses and encrypts data before exfiltration by using password-protected 0.7z archives.
2.2. Common Device Behavioral Sources Used for Attack Detection
2.2.1. Device Behavior Monitoring
- Externally-collected behavior sources—This category contains an external device (proxy or a gateway) that monitors devices and collects network-based data [12].
- In-device behavior—In this category, the devices are subjected to behavioral data monitoring [12]. In the case of device behavior data, data is often gathered from different sources such as hardware events, resource usage, software and processes, device sensors, and actuators.
- Hardware Events—In modern microprocessors, hardware performance counters (HPCs) are specific registers designated for storing hardware-related event counters. These events may be used to detect suspicious events [12];
- Resource Usage—Device components’ use and status are monitored for anomaly detection. The most frequently observed components are the processor, memory, disk, and network [12];
- Software and Processes—The installed software on each device has its own unique behavior. Then, in conjunction with the isolated software behaviors, a global device behavior may be modeled for anomaly detection [12]. Software may be modeled in a variety of ways, including:
- -
- -
- Process properties—The features of each process, such as its name, status, or threads, may be used to model the behavior of the device software. Resources needed to run specific software or code are also included in this category [38];
- -
- Software signatures—Software snapshots (signatures) may be used for the detection of software modifications caused by anomalous behavior [39].
2.2.2. Behavior Processing and Evaluation Techniques
2.2.3. Attack Detection
2.3. General Overview of Advanced Persistent Threat Mitigation Approaches
2.3.1. Threat Modeling Approaches
- 1.
- DFD (data flow diagrams)—DFD is a graphical system depiction that illustrates all of the inputs, logical internal processes, and outputs. As part of the threat modeling process, DFDs focus on external elements and trust boundaries and storing and processing the data [45]. As a result of this method, the security analysts will be able to track data flow across the system in order to identify critical processes and threats to those processes. This approach has the following steps: view System as an adversary, characterize the system, and identify the threats [46].View System as an adversary analyzes the visible and accessible processes and functionalities that an attacker may use to breach the system. Characterizing the system means obtaining a background of system information and identifying weak points that need to be addressed. While identifying the threats includes thinking about and describing possible methods of attacking the entrance and exit points of the system [46];
- 2.
- STRIDE (Spoofing, Tampering, Repudiation, Denial of Service, and Elevation of Privilege)—STRIDE is a system-based threat classification that classifies threats according to their explicit types [47]. It was first introduced to Microsoft developers in 1999 to aid them in identifying threats related to their software products. The root cause might be classified as a security flaw in the design, a security bug in the code, or an issue resulting from an unsafe configuration [47]. STRIDE assists in mitigating risks regarding confidentiality, availability, authentication, authorization, and nonrepudiation [48]. STRIDE Categories may have several threats, or a threat can have multiple STRIDE Categories;
- 3.
- Attack trees—Attack trees are conceptual diagrams that utilize a branching, hierarchical data structure to represent threats and their possible attack vectors needed to achieve the attacker’s objective [49,50]. It was introduced by Bruce Schneier to represent threats against computer systems [43]. Attack trees categorize all known system attacks and assign risk and cost values to each attack vector [49]. Defining the main goal and breaking it down into sub-goals are common stages in the attack tree approach. The root node signifies the attack’s purpose, and the leaf nodes reflect the several paths that may be used to achieve that goal [51];
- 4.
- Stochastic or mathematical models—In this approach, attacks and their characteristics are often converted to Markov chains and analyzed using state transition matrices [52]. Markov chains have the ability to determine chains of attack vectors that require previous and current system states to be met before an attack may proceed on its current path [52].The game theory concept has also been used to model cyber threats such as APT. The game-theoretic basis is to build a multi-stage Bayesian game framework to capture incomplete information about deceptive APTs and their multi-stage movement [43];
- 5.
- Kill chain—The term kill chain originated as a military concept relating to the attack’s structure [43]. The idea is to effectively prevent or counter the opponent throughout the attack lifecycle [53]. The intrusion kill chain is defined as reconnaissance, weaponization, delivery, exploitation, installation, command, and control (C2), and actions on objectives (AOO) [53]. Effectively attributing cyber attacks requires identifying them based on their attack patterns and different phases of the kill chain. These attack patterns are Tactics, Techniques, and Procedures (TTP) of APT. A tactic is a behavior that is used to reach an objective, the technique is a potential method for implementing a tactic [54], and the procedure is a set of APT activities executed at each phase of the APT life cycle [55]. To achieve the APT’s goal, different tactics can be used. In turn, these tactics are accomplished by using one or many techniques;
- 6.
- MITRE ATT&CK—MITRE ATT&CK is an acronym for the Massachusetts Institute of Technology Research and Engineering, Adversarial Tactics, Techniques, and Common Knowledge [8]. MITRE established the Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework in 2013 in an effort to better understand cyber threats [56]. MITRE had ATT&CK matrices associated with Enterprise assets (Linux/MacOS/Windows), mobile devices, and an initial PRE-ATT&CK pattern prior to October 2020 [43]. PRE-ATT&CK was a framework that aligns with the first three steps of the kill chain, namely reconnaissance, weaponization, and delivery. Version 11 of the ATT&CK Enterprise framework now includes PRE-ATT&CK and more closely aligns with all phases of the kill chain, including the post-access phases of exploitation, installation, C2, and AOO [43]. Tactics represent an adversary’s tactical objectives during an operation. The ATT&CK model’s techniques define the actions that adversaries may take to achieve their tactical goals. [57]. ATT&CK builds on the Cyber Kill Chain by concentrating on the techniques, tactics, and indicators of Compromise (IOC) associated with these adversaries. A significant difference between an ATT&CK technique and an IOC is that many ATT&CK techniques are legitimate system functions that may be utilized for malicious purposes [57], making them more difficult to detect by the defender. MITRE has also mapped software attacks from publicly reported technique use and accounts for the capability of the software adversary to use a technique [54];
- 7.
- Common Attack Pattern Enumeration and Classification (CAPEC)—CAPEC is a standard vulnerability database that provides a list of the most common methods attackers employ to exploit vulnerabilities identified in Common Weakness Enumerations (CWE) [43]. This means that CAPEC focuses on application security and defines the common characteristics and strategies used by attackers to exploit known vulnerabilities. CAPEC analyzes and categorizes cyber-attacks according to a set of attack patterns that may occur pre- or post-exploitation. In addition, it defines the stages of common cyber-attacks and documents their countermeasures. Within the CAPEC Model, there are three levels of the attack patterns (Meta, Standard, and Detailed) [43]. Attack patterns describe the characteristics and techniques used by adversaries to exploit known system vulnerabilities. The first is meta attack patterns, which lack detailed information on the technology or implementation by cyber attacks. The second is standard attack patterns, which are more procedural and specific. The third pattern is the detailed attack pattern.
- 8.
- Threat Assessment and Remediation Analysis (TARA)—TARA is a MITRE initiative that identifies and assesses cyber threats, as well as the effectiveness of countermeasures [58]. TARA includes an adversary TTP threat matrix called the Cyber Threat Susceptibility Analysis (CTSA). CTSA and Cyber Risk Remediation Analysis (CTRA) are then utilized to complete the TARA process [43]. CSTA consists of defining the assets in scope, identifying related TTP, removing unlikely TTP, applying a ranking system and constructing a threat matrix that defines the score, target assets, and adversary type [43];
- 9.
- Diamond—Diamond is a model that correlates and describes the capabilities of an adversary with the infrastructure of a target. It observes cyber-attacks assuming that the attacker’s targets and its TTP will vary over time [59]. The diamond threat model is a formal approach to applying scientific principles to intrusion analysis that maps the features of an adversary’s capacity to a target’s infrastructure [43]. It is used to track attack groups assuming that the attacker’s targets and its TTP will vary over time [59]. It derives its name from the diamond shape used to visually represent the four components of an intrusion: the adversary, the infrastructure, the capacity, and the victim. [59]. Similar to the Kill Chain and ATT&CK models, the diamond approach is based on an attacker using their (TTP) against a targeted system to achieve a predetermined objective. It provides a tested and repeatable approach for identifying activities and correlating them with an attack using quantifiable measures [43];
- 10.
- The National Institute of Standards and Technology (NIST) special publication 800-154—NIST 800-154 covers the fundamentals of threat modeling for data-centric systems [56]. Using NIST, threat modeling is described via a four-step qualitative approach [56]. The first step is the identification and characterizing stage that includes only specific information about a single system or a limited set of closely connected systems. The second stage, which is based on risk assessments, determines the possible attack vectors of an adversary (probability and effect). The third stage focuses on identifying security controls to mitigate particular attack actions. Finally, the threat model is analyzed to identify all possible attack vectors and security controls for unacceptably high risks [44].
2.3.2. The Process of Risk Management Approaches
- Context establishment—The external and internal contexts for ISRM should be established, which includes identifying the fundamental criteria, defining the scope and bounds, and establishing an appropriate organization to operate the ISRM [62];
- Risk assessment—This step necessitates gathering the required resource data (e.g., information assets, their vulnerabilities, mappings of each threat-asset-vulnerability combination, and identifying the possible effect of each risk scenario) [61]. The risk assessment process consists of three stages as follows:
- Risk identification—Includes asset identification within the established scope, threat identification, control identification, and consequence identification of losses of CIA of the assets [62];
- Risk analysis—In this step, the analysis of the risk is focused on the following: Consequence assessment (assess the potential information security incidents and their consequences that may result in the loss of CIA of an organization’s assets), Incident likelihood assessment (assess the possibility of a security incident), and Risk level determination (all relevant incident scenarios should have their own risk level) [62];
- Risk treatment—Identify the security controls to decrease, preserve, avoid, or share risks, and define the risk treatment plan [62].
- Risk acceptance—Make a decision to mitigate the risks to an acceptable level. The impact of this decision should be stated [62];
- Risk communication and consultation—Decision-makers and other stakeholders in the decision-making process should exchange and/or share this risk information [62];
- Risk monitoring and review—Risk factors (such as the asset value, effects, threats, vulnerabilities, and incident occurrence probability) should be observed and analyzed in order to determine the changes in the environment at an early stage [62].
2.3.3. The Concept of Soft and Hard Trust Management
- Direct: In this feature, A and B have direct communication; the trust value is computed and inferred as a result of this direct communication [65];
- Indirect: Trust is considered indirect when there is no direct connection between A and B. In order to determine the trust value of B, it is necessary to consider the recommendations that have been propagated to A from various nodes in the network [65];
- Objective: If the trust is calculated based on specific parameters, such as the device’s quality of service (QoS), it is considered objective [65];
- Local: The trust value between A and B is only valid between these two nodes. B may have a different trust value from another C in the network [65];
- Global: A unique trust value is assigned to each node, which is known by all of the other nodes in the network [65];
- History-dependent: In order to calculate trust, the nodes’ historical behavior is taken into consideration [65];
- Composite: The trust value may comprise a variety of factors such as honesty, reliability, security, etc. [65];
- Dynamic: If any changes happen in the topology, the properties of the network, or the environment, the trust value should be updated accordingly [65].
- Access Segmentation—Each resource access needs to be properly segmented so that no single entity may access the whole/a large part of the network [67];
- Universal Authentication—All entities that interact with the corporate network involving users, devices, applications, and workloads must be verified regardless of their network location [67];
- Encrypt as Much as Possible—Zero trust considers the worst-case scenario, such as a data breach. This means that the network is constantly hostile, and thus trust cannot be automatically provided [67];
- Least Privilege Principle—Each entity in a zero trust should be constrained to the minimum level of privileges to carry out a specific mission [67];
- Continuous Monitoring and Adjusting—It is necessary to monitor each entity (internal or external) in a zero trust. This means that regardless of whether or not an access attempt is successful, all network traffic, system activities, and attempts to access the assets are observed and recorded [67].
2.3.4. Situational Awareness Models
3. Research Methodology
3.1. Review Questions
- RQ1—What are the APT activities reported by researchers?
- RQ2—What are the proposed defensive mechanisms available to defend against APT?
- RQ3—What are the existing risk management techniques utilized by the primary studies?
3.2. Review Protocol
- Formulate the research questions based on PICOC criteria to define the main keywords;
- Recognize synonyms and other spelling variations for each main keyword;
- Verify search keywords included in titles, abstracts, and keywords;
- Construct a search string using the Boolean conjunction operators.
- Papers are written in the English language;
- Published from 2011 to 2022;
- Published in a journal.
- Articles are written in a language other than English;
- Papers that do not refer to research questions or do not adequately identify the subject;
- Research papers of less than three pages.
- Identification: The search string was performed on five digital libraries: Springer Link, Science Direct, Association for Computer Machinery (ACM), Scopus, and IEEE Xplore and 1652 papers were retrieved.
- Screening: After eliminating duplicated papers in the last twelve years (2011–2022), non-English language papers, and non-journal papers, the authors were left with 265 papers.
- Eligibility: Related papers were identified by searching title abstracts and keywords in the digital libraries. Papers with inadequate information to answer the research questions were excluded. The selected papers were further investigated by reading each one’s introduction and conclusion. Papers deemed irrelevant were eliminated.
- Included: In this criteria, two new related papers were identified, thanks to snowballing. As a result, 112 journal papers were selected.
4. Analysis and Findings of Research Questions
4.1. RQ1: What Are the APT Activities Reported by Researchers?
4.1.1. Initial Access
- Attacks on Internet-facing servers—Access to the target’s internal infrastructure is established through penetrating Internet-facing servers. To penetrate these servers, credentials are often obtained using brute-force attacks or exploiting known server vulnerabilities [106];
- Spoofing attack—Attackers appear to be someone or something else in order to gain the confidence of the targeted user and gain access to systems [96].
4.1.2. Execution
4.1.3. Persistence
4.1.4. Privilege Escalation
- User to Root (U2R)—U2R attacks happen when the attackers successfully compromise a normal user’s account and escalate their privileges to get root access to the target system [116].
4.1.5. Defense Evasion
4.1.6. Credential Access
- Brute-force attack—This occurs when an attacker submits a large number of passwords or passphrases in the expectation of guessing correctly eventually [28];
- Pass-the-Hash (PtH)—An attacker captures a hash of a password instead of the password characters and then uses it to authenticate and possibly get access to other networked systems [28];
- Password cracking—The attacker may run a password cracker or purchase a password in an underground forum [119];
- Eavesdropping attack—This is also referred to as a sniffing or snooping attack. Passwords, credit card information, and other sensitive data are easily stolen during the transmission of data from one device to another [120].
4.1.7. Discovery
- Social engineering—In order to obtain information and gain access to a system, social engineering attacks often target people as their primary target. Most APT attackers use this technique to gather information about the targeted user at the reconnaissance stage, moving laterally to other systems or figuring out the compromised systems [78,80,81,82,85,87,97,105,107,111,121,122,123];
- Probing attack—This is a passive attack that relies on methods such as footprinting and social engineering to gather information about a particular system [124].
4.1.8. Lateral Movement
4.1.9. Collection
- Data leakage—This attack happens when a source (a person or a device) within the business sends data to an unauthorized entity (the attacker) outside the organization without permission [108].
- Cloud data leakage—This attack happens when the attacker is trying to disclose information about an organization’s customers or the services it provides without the organization’s consent [108].
4.1.10. Command and Control
- Network protocols—For remote connection and data transfer, most C2s utilize the standard Hypertext Transfer Protocol (HTTP) or other common network protocols such as the File Transfer Protocol (FTP), the Simple Mail Transfer Protocol (SMTP)/Post Office Protocol (POP3), the Secure Shell (SSH)/Transport Layer Security (TLS), the Internet Control Message Protocol (ICMP), the Domain Network System (DNS), or other network protocols [100,126];
- Removable media—Attackers may misuse removable media, such as a USB drive or a hard disk, to transmit malicious files or exfiltrate data [126].
4.1.11. Impact
- Software Update Attacks—Software update attacks may be used to compromise system integrity and availability by disrupting the updating process of the installed software [108];
- Data Fabrication—Data fabrication is the generation of malicious data or processes in order to exploit access granted for a different reason, such as tampering with system integrity [108].
4.2. RQ2: What Are the Proposed Defensive Mechanisms Available to Defend against APT?
4.3. RQ3: What Are the Existing Risk Management Approaches Utilized by the Primary Studies?
5. Research Discussion
5.1. Research Gaps
5.1.1. Solution Techniques Are Ineffective and Not Fully Bullet-Proof
5.1.2. Solution Techniques Are Unable to Detect APTs in a Timeframe
5.1.3. Attack Paths Are Unclear and Proprietary to Models
5.1.4. Existing APT Device Behavior Solutions Fail to Solve the APT Issue
5.1.5. Biased Solutions in Terms of Grouping
5.2. Recommendations for Future Investigations
5.2.1. To Design an Effective Solution That Follows a Cyber-Security Framework Such as NIST or ISO
5.2.2. To Design an Efficient Solution That Has a Decision-Making Model Using Cyber SA
5.2.3. To Design Attack Paths Using Threat Modeling Approaches
5.2.4. To Manipulate Mobile Device Behavior through Resource Usage and User Activity
5.2.5. To Design an APT Solution That Is personalized Based on Mobile Users
6. Proposed Conceptual APT Mitigation Framework
6.1. Observe
6.2. Orient
6.3. Decide
6.4. Act
7. Study Limitations
8. Conclusions
Author Contributions
Funding
Informed Consent Statement
Conflicts of Interest
References
- Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. DFA-AD: A Distributed Framework Architecture for the Detection of Advanced Persistent Threats. Clust. Comput. 2017, 20, 597–609. [Google Scholar] [CrossRef]
- Computer Basics—Mobile Devices. Available online: https://edu.gcfglobal.org/en/computerbasics/mobile-devices/1 (accessed on 23 March 2022).
- Xiang, Z.; Guo, D.; Li, Q. Detecting Mobile Advanced Persistent Threats Based on Large-Scale DNS Logs. Comput. Secur. 2020, 96, 101933. [Google Scholar] [CrossRef]
- Fun, T.S.; Samsudin, A. Attribute Based Encryption—A Data Centric Approach for Securing Internet of Things (IoT). Adv. Sci. Lett. 2017, 23, 4219–4223. [Google Scholar] [CrossRef]
- Taheri, R.; Shojafar, M.; Alazab, M.; Tafazolli, R. FED-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT. IEEE Trans. Ind. Inform. 2020, 17, 8442–8452. [Google Scholar] [CrossRef]
- Demertzis, K.; Iliadis, L.; Tziritas, N.; Kikiras, P. Anomaly Detection via Blockchained Deep Learning Smart Contracts in Industry 4.0. Neural Comput. Appl. 2020, 32, 17361–17378. [Google Scholar] [CrossRef]
- Ma, Z.; Li, Q.; Meng, X. Discovering Suspicious APT Families through a Large-Scale Domain Graph in Information-Centric IoT. IEEE Access 2019, 7, 13917–13926. [Google Scholar] [CrossRef]
- Jabar, T.; Mahinderjit Singh, M.; Al-Kadhimi, A.A. Mobile Advanced Persistent Threat Detection Using Device Behaviour (SHOVEL) Framework. In Proceedings of the 8th International Conference on Computational Science and Technology, Lecture Notes in Electrical Engineering, Labuan, Malaysia, 28–29 August 2021; Volume 835, pp. 495–513. [Google Scholar]
- Zoopark Is A Mobile APT Focused on Middle Eastern Targets. Available online: https://apt.securelist.com/apt/zoopark (accessed on 23 March 2022).
- North Korean Hackers Have Prolific Year as Their Unlaundered Cryptocurrency Holdings Reach All-Time High. Available online: https://blog.chainalysis.com/reports/north-korean-hackers-have-prolific-year-as-their-total-unlaundered-cryptocurrency-holdings-reach-all-time-high/ (accessed on 23 March 2022).
- Advanced Persistent Threat Detection—Advanced Threat Protection. Available online: http://www.bit9.com/advanced-persistent-threat/index.php (accessed on 23 March 2022).
- Sanchez, P.M.S.; Valero, J.M.J.; Celdran, A.H.; Bovet, G.; Perez, M.G.; Perez, G.M. A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets. IEEE Commun. Surv. Tutor. 2021, 23, 1048–1077. [Google Scholar] [CrossRef]
- Mohamed, N.; Belaton, B. SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique. IEEE Access 2021, 9, 42919–42932. [Google Scholar] [CrossRef]
- Luh, R.; Schramm, G.; Wagner, M.; Janicke, H.; Schrittwieser, S. SEQUIN: A Grammar Inference Framework for Analyzing Malicious System Behavior. J. Comput. Virol. Hacking Tech. 2018, 14, 291–311. [Google Scholar] [CrossRef] [Green Version]
- Luh, R.; Janicke, H.; Schrittwieser, S. AIDIS: Detecting and Classifying Anomalous Behavior in Ubiquitous Kernel Processes. Comput. Secur. 2019, 84, 120–147. [Google Scholar] [CrossRef] [Green Version]
- Friedberg, I.; Skopik, F.; Settanni, G.; Fiedler, R. Combating Advanced Persistent Threats: From Network Event Correlation to Incident Detection. Comput. Secur. 2015, 48, 35–57. [Google Scholar] [CrossRef]
- Han, X.; Pasquier, T.; Bates, A.; Mickens, J.; Seltzer, M. Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. Cryptogr. Secur. 2020, 2, 1–19. [Google Scholar]
- Bakar, A.A.; Mahinderjit Singh, M.; Shariff, A.R.M. A Privacy Preservation Quality of Service (Qos) Model for Data Exposure in Android Smartphone Usage. Sensors 2021, 21, 1667. [Google Scholar] [CrossRef] [PubMed]
- NIST vs. ISO: What’s the Difference? Available online: https://www.auditboard.com/blog/nist-vs-iso-whats-the-difference (accessed on 23 March 2022).
- What is the NIST Cybersecurity Framework? Balbix. Available online: https://www.balbix.com/insights/nist-cybersecurity-framework/ (accessed on 23 March 2022).
- Xuan, C.D.; Van Duong, L.; Tisenko, V.N. Detecting C&C Server in the APT Attack Based on Network Traffic Using Machine Learning. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 22–27. [Google Scholar]
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. NIST Special Publication 800–207 Zero Trust Architecture; National Institute of Standards and Technology, US Department of Commerce: Washington, DC, USA, 2020.
- Hussain, S.; Bin Ahmad, M.; Ghouri, S.S.U. Advance Persistent Threat—A Systematic Review of Literature and Meta-Analysis of Threat Vectors. Adv. Intell. Syst. Comput. 2021, 1158, 161–178. [Google Scholar]
- Ahmad, A.; Webb, J.; Desouza, K.C.; Boorman, J. Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack. Comput. Secur. 2019, 86, 402–418. [Google Scholar] [CrossRef]
- United States Department of Defense. Jp1_02, Department of Defense Dictionary of Military and Associated Terms; United States Department of Defense: Washington, DC, USA, 2010.
- Department of the Army. FM 3-38: Cyber Electromagnetic Activities; Department of the Army: Washington, DC, USA, 2014. [Google Scholar]
- Chen, J.; Zhu, Q. Security as a Service for Cloud-Enabled Internet of Controlled Things under Advanced Persistent Threats a Contract Design Approach. IEEE Trans. Inf. Forensics Secur. 2016, 12, 1556–6013. [Google Scholar] [CrossRef]
- Ahmed, Y.; Asyhari, A.T.; Rahman, M.A. A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats. Comput. Mater. Contin. 2021, 67, 2497–2513. [Google Scholar] [CrossRef]
- Chen, P.; Desmet, L.; Huygens, C. A Study on Advanced Persistent Threats. In Proceedings of the IFIP International Conference on Communications and Multimedia Security, Aveiro, Portugal, 25–26 September 2014; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer: Berlin, Heidelberg, 2014; Volume 8735, pp. 63–72. [Google Scholar]
- FrozenCell, Software S0577—MITRE ATT&CK®. Available online: https://attack.mitre.org/software/S0577/ (accessed on 23 March 2022).
- Riad, K.; Huang, T.; Ke, L. A Dynamic and Hierarchical Access Control for IoT in Multi-Authority Cloud Storage. J. Netw. Comput. Appl. 2020, 160, 102633. [Google Scholar] [CrossRef]
- Fuentes, A. Human Niche, Human Behaviour, Human Nature. R. Soc. Publ. 2017, 7, 1–13. [Google Scholar] [CrossRef]
- Shone, N.; Shi, Q.; Merabti, M.; Kifayat, K. Misbehaviour Monitoring on System-of-Systems Components. In Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, 23–25 October 2013. [Google Scholar]
- Ferrando, R.; Stacey, P. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal from Security Threats. In Proceedings of the 1st International Conference on Internet of Things and Machine Learning, Liverpool, UK, 17–18 October 2017. [Google Scholar]
- Schmidt, F.; Suri-Payer, F.; Gulenko, A.; Wallschlager, M.; Acker, A.; Kao, O. Unsupervised Anomaly Event Detection for Cloud Monitoring Using Online Arima. In Proceedings of the 11th IEEE/ACM International Conference on Utility and Cloud Computing Companion, UCC Companion 2018, Zurich, Switzerland, 17–20 December 2018; pp. 36–42. [Google Scholar]
- Deshpande, P.; Sharma, S.C.; Peddoju, S.K.; Junaid, S. HIDS: A Host Based Intrusion Detection System for Cloud Computing Environment. Int. J. Syst. Assur. Eng. Manag. 2018, 9, 567–576. [Google Scholar] [CrossRef]
- Liu, Z.; Japkowicz, N.; Wang, R.; Cai, Y.; Tang, D.; Cai, X. A Statistical Pattern Based Feature Extraction Method on System Call Traces for Anomaly Detection. Inf. Softw. Technol. 2020, 126, 0950–5849. [Google Scholar] [CrossRef]
- Haider, W.; Hu, J.; Slay, J.; Turnbull, B.P.; Xie, Y. Generating Realistic Intrusion Detection System Dataset Based on Fuzzy Qualitative Modeling. J. Netw. Comput. Appl. 2017, 87, 185–192. [Google Scholar] [CrossRef]
- Samir, A.; Pahl, C. Detecting and Localizing Anomalies in Container Clusters Using Markov Models. Electronics 2020, 9, 64. [Google Scholar] [CrossRef] [Green Version]
- Zhanwei, S.; Zenghui, L. Abnormal Detection Method of Industrial Control System Based on Behavior Model. Comput. Secur. 2019, 84, 166–178. [Google Scholar] [CrossRef]
- Neha, N.; Priyanga, S.; Seshan, S.; Senthilnathan, R.; Sriram, V.S.S. Sco-Rnn A Behavioral-Based Intrusion Detection Approach for Cyber Physical Attacks in Scada Systems. In Inventive Communication and Computational Technologies; Springer: Singapore, 2020; pp. 911–919. [Google Scholar]
- How to Train and Test Data Like a Pro—SDS Club. Available online: https://sdsclub.com/how-to-train-and-test-data-like-a-pro/ (accessed on 29 May 2022).
- Tatam, M.; Shanmugam, B.; Azam, S.; Kannoorpatti, K. A Review of Threat Modelling Approaches for APT-Style Attacks. Heliyon 2021, 7, e05969. [Google Scholar] [CrossRef]
- Indahningrum, R.P. Cyber Threat Modeling: Survey, Assessment, and Representative Framework. Eccouncil 2018, 2507, 1–9. [Google Scholar]
- Sion, L.; Yskout, K.; Van Landuyt, D.; Joosen, W. Solution-Aware Data Flow Diagrams for Security Threat Modeling. In Proceedings of the SAC’ 18—33rd Annual ACM Symposium on Applied Computing, Pau, France, 9–13 April 2018; pp. 1425–1432. [Google Scholar]
- DFD Based Threat Modelling—Set 1—GeeksforGeeks. Available online: https://www.geeksforgeeks.org/dfd-based-threat-modelling-set-1/ (accessed on 6 March 2022).
- Meucci, M.; Andrew, M. Owasp Testing Guide v. 4.0; The OWASP Foundation: Bel Air, MD, USA, 2014. [Google Scholar]
- Xu, D.; Tu, M.; Sanford, M.; Thomas, L.; Woodraska, D.; Xu, W. Automated Security Test Generation with Formal Threat Models. IEEE Trans. Dependable Secur. Comput. 2012, 9, 526–540. [Google Scholar] [CrossRef]
- Schneier, B. Academic: Attack Trees—Schneier on Security. December. Available online: https://www.schneier.com/academic/archives/1999/12/attack_trees.html (accessed on 29 May 2022).
- Al-Kadhimi, A.A.; Mahinderjit Singh, M.; Jabar, T. Fingerprint for Mobile-Sensor APT Detection Framework (FORMAP) Based on Tactics Techniques and Procedures (TTP) and MITRE. In Proceedings of the 8th International Conference on Computational Science and Technology, Labuan, Malaysia, 28–29 August 2021; Volume 835, pp. 515–533. [Google Scholar]
- Martins, G.; Bhatia, S.; Koutsoukos, X.; Stouffer, K.; Tang, C.; Candell, R. Towards a Systematic Threat Modeling Approach for Cyber-Physical Systems. In Proceedings of the 2015 Resilience Week (RWS), Philadelphia, PA, USA, 18–20 August 2015; pp. 114–119. [Google Scholar]
- Gore, R.; Padilla, J.; Diallo, S. Markov Chain Modeling of Cyber Threats. J. Def. Model. Simul. Appl. Methodol. Technol. 2017, 14, 233–244. [Google Scholar] [CrossRef]
- Lockheed Martin Corporation. Gaining the Advantage—Applying Cyber Kill Chain Methodology to Network Defense; Lockheed Martin Corporation: Bethesda, MD, USA, 2015. [Google Scholar]
- Al-Shaer, R.; Spring, J.M.; Christou, E. Learning the Associations of Mitre Att & Ck Adversarial Techniques. IEEE Conf. Commun. Netw. Secur. 2020, 2, 1–9. [Google Scholar]
- Tactics, Techniques, and Procedures (TTPs)—Azeria Labs. Available online: https://azeria-labs.com/tactics-techniques-and-procedures-ttps/ (accessed on 23 March 2022).
- Souppaya, M.; Scarfone, K. Guide to Data-Centric System Threat Modeling; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016.
- Strom, B.E.; Battaglia, J.A.; Kemmerer, M.S.; Kupersanin, W.; Miller, D.P.; Whitley, S.M.; Wolf, R.D. Finding Cyber Threats with ATT&CK™-Based Analytics; Technical Report No. MTR170202; The MITRE Corporation: Bedford, MA, USA, 2017. [Google Scholar]
- Wynn, J.; Whitmore, J.; Upton, G.; Spriggs, L.; McKinnon, D.; McInnes, R.; Graubart, R.; Clausen, L. Threat Assessment & Remediation Analysis (TARA) Methodology Description Version 1.0. Bedford, MA. 2011. Available online: https://www.mitre.org/sites/default/files/pdf/11_4982.pdf (accessed on 7 May 2022).
- Samtani, S.; Chinn, R.; Chen, H.; Nunamaker, J.F. Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. J. Manag. Inf. Syst. 2017, 34, 1023–1053. [Google Scholar] [CrossRef]
- Lee, I. Internet of Things (IoT) Cybersecurity. Literature Review and Iot Cyber Risk Management. Future Internet Rev. 2020, 12, 157. [Google Scholar] [CrossRef]
- Webb, J.; Ahmad, A.; Maynard, S.B.; Shanks, G. A Situation Awareness Model for Information Security Risk Management. Comput. Secur. 2014, 44, 1–15. [Google Scholar] [CrossRef]
- Webb, J.; Ahmad, A.; Maynard, S.B.; Shanks, G. Foundations for an Intelligence-Driven Information Security Risk-Management System. J. Inf. Technol. Theory Appl. 2016, 17, 25–51. [Google Scholar]
- Varadharajan, V. A Note on Trust-Enhanced Security. IEEE Secur. Priv. 2009, 7, 57–59. [Google Scholar] [CrossRef]
- Chieng, L.B.; Mahinderjit Singh, M.; Fitri, Z.Z.; Hassan, R. Multi-Facet Trust Model for Online Social Network Environment. Int. J. Netw. Secur. Appl. 2015, 7, 1–18. [Google Scholar] [CrossRef]
- Ayed, S.; Chaari, L.; Fares, A. A Survey on Trust Management for WBAN: Investigations and Future Directions. Sensors 2020, 20, 6041. [Google Scholar] [CrossRef]
- Mahinderjit Singh, M.; Li, X. Computational Model for Trust Management in RFID Supply Chains. In Proceedings of the 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS ’09, Macau, China, 12–15 October 2009; pp. 734–740. [Google Scholar]
- Alevizos, L.; Ta, V.T.; Hashem Eiza, M. Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A State-of-the-art Review. Secur. Priv. 2022, 5, 1–27. [Google Scholar] [CrossRef]
- Pahi, T.; Leitner, M.; Skopik, F. Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy—ICISSP 2017, Porto, Portugal, 19–21 February 2017; pp. 334–345. [Google Scholar]
- Ahmad, A.; Maynard, S.B.; Desouza, K.C.; Kotsias, J.; Whitty, M.T.; Baskerville, R.L. Cybersecurity Incident Response in Organizations: An Exploratory Case Study and Process Model of Situation Awareness. Comput. Secur. 2021, 101, 102–122. [Google Scholar] [CrossRef]
- Endsley, M.R. Toward a Theory of Situation Awareness in Dynamic Systems. Hum. Factors 1995, 37, 32–64. [Google Scholar] [CrossRef]
- Boyd, J.R. The Essence of Winning and Losing. Unpublished Lecture Notes 12, no. 23; pp. 123–125. 1996. Available online: https://fasttransients.files.wordpress.com/2010/03/essence_of_winning_losing.pdf (accessed on 7 May 2022).
- Steinberg, A.N.; Bowman, C.L. Revisions to the Jdl Data Fusion Model. In Proceedings of the SPIE 3719, Orlando, FL, USA, 12 March 1999; pp. 430–441. [Google Scholar]
- Okolica, J.; McDonald, J.; Peterson, G.; Mills, R.F.; Haas, M. Developing Systems for Cyber Situational Awareness. In Proceedings of the Cyberspace Research Workshop, Shreveport, LA, USA, 15 June 2009; pp. 46–56. [Google Scholar]
- Tadda, G.P.; Salerno, J.S. Overview of Cyber Situation Awareness. In Cyber Situational Awareness; Springer: Boston, MA, USA, 2010; pp. 15–35. [Google Scholar]
- Evancich, N.; Lu, Z.; Li, J.; Cheng, Y.; Tuttle, J.; Xie, P. Network-Wide Awareness. In Cyber Defense and Situational Awareness, Cyber Defense and Situational Awareness; Springer: Cham, Switzerland, 2014; Volume 62, pp. 63–91. [Google Scholar]
- Hinderks, A.; Mayo, F.J.D.; Thomaschewski, J.; Escalona, M.J. An SLR-Tool: Search Process in Practice. In Proceedings of the ICSE 2020: ACM/IEEE 42nd International Conference on Software Engineering, Seoul, Korea, 5–11 October 2020; pp. 81–84. [Google Scholar]
- Keele, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Technical Report, Ver. 2.3 EBSE Technical Report; EBSE: Goyang-si, Korea, 2007; pp. 1–65. [Google Scholar]
- Bahaa, A.; Abdelaziz, A.; Sayed, A.; Elfangary, L.; Fahmy, H. Monitoring Real Time Security Attacks for Iot Systems Using Devsecops A Systematic Literature Review. Information 2021, 12, 154. [Google Scholar] [CrossRef]
- Vinayakumar, R.; Alazab, M.; Srinivasan, S.; Pham, Q.V.; Padannayil, S.K.; Simran, K. A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities. IEEE Trans. Ind. Appl. 2020, 56, 4436–4456. [Google Scholar] [CrossRef]
- Au, M.H.; Liang, K.; Liu, J.K.; Lu, R.; Ning, J. Privacy-Preserving Personal Data Operation on Mobile Cloud—Chances and Challenges over Advanced Persistent Threat. Future Gener. Comput. Syst. 2018, 89, 337–349. [Google Scholar] [CrossRef]
- Hwang, C.; Kim, D.; Lee, T. Semi-Supervised Based Unknown Attack Detection in EDR Environment. KSII Trans. Internet Inf. Syst. 2020, 14, 4909–4926. [Google Scholar]
- Tian, W.; Du, M.; Ji, X.; Liu, G.; Dai, Y.; Han, Z. Honeypot Detection Strategy against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game. IEEE Internet Things J. 2021, 8, 17372–17381. [Google Scholar] [CrossRef]
- Yang, M.-H.; Luo, J.-N.; Vijayalakshmi, M.; Shalinie, S.M. Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices. IEEE Access 2020, 8, 201087–201097. [Google Scholar] [CrossRef]
- Ghafir, I.; Prenosil, V.; Hammoudeh, M.; Baker, T.; Jabbar, S.; Khalid, S.; Jaf, S. BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access 2018, 6, 38947–38958. [Google Scholar] [CrossRef]
- Cohen, A.; Nissim, N.; Lior, R.; Yuval, E. SFEM Structural Feature Extraction Methodology for the Detection of Malicious Office Documents Using Machine Learning Methods. Expert Syst. Appl. 2016, 36, 324–343. [Google Scholar] [CrossRef]
- Bolton, A.D.; Anderson-Cook, C.M. APT Malware Static Trace Analysis through Bigrams and Graph Edit Distance. Stat. Anal. Data Min. 2017, 10, 182–193. [Google Scholar] [CrossRef]
- Kim, K.; Shin, Y.; Lee, J.; Lee, K. Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator. Sensors 2021, 21, 6522. [Google Scholar]
- Vatamanu, C.; Gavriluţ, D.; Benchea, R. A Practical Approach on Clustering Malicious PDF Documents. J. Comput. Virol. 2012, 8, 151–163. [Google Scholar] [CrossRef]
- Berger, S.; Chen, Y.; Hu, X.; Pendarakis, D.; Rao, J.R.; Sailer, R.; Schales, D.L.; Stoecklin, M.P. Closing the Loop: Network and in-Host Monitoring Tandem for Comprehensive Cloud Security Visibility. IBM J. Res. Dev. 2016, 60, 10:1–10:12. [Google Scholar] [CrossRef]
- Wu, Y.; Huang, C.; Zhang, X.; Zhou, H. GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things. Secur. Commun. Netw. 2020, 2020, 8842539. [Google Scholar] [CrossRef]
- Gonzales, D.; Kaplan, J.; Saltzman, E.; Winkelman, Z.; Woods, D. Cloud-Trust—A Security Assessment Model for Infrastructure as a Service (IaaS) Clouds. IEEE Trans. Cloud Comput. 2017, 5, 523–536. [Google Scholar] [CrossRef] [Green Version]
- Zhu, Q.; Pawlick, J. Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an Application to Glucose Control. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2906–2919. [Google Scholar]
- Khan, T.; Alam, M.; Akhunzada, A.; Hur, A.; Asif, M.; Khan, M.K. Towards Augmented Proactive Cyberthreat Intelligence. J. Parallel Distrib. Comput. 2019, 124, 47–59. [Google Scholar] [CrossRef]
- Atapour, C.; Agrafiotis, I.; Creese, S. Modeling Advanced Persistent Threats to Enhance Anomaly Detection Techniques. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2018, 9, 71–102. [Google Scholar]
- Torii, S.; Morinaga, M.; Yoshioka, T.; Terada, T.; Unno, Y. Multi-Layered Defense against Advanced Persistent Threats (APT). Fujitsu Sci. Tech. 2014, 50, 52–59. [Google Scholar]
- Alghamdi, W.; Schukat, M. Precision Time Protocol Attack Strategies and Their Resistance to Existing Security Extensions; Springer: Berlin/Heidelberg, Germany, 2021; Volume 4, pp. 1–17. [Google Scholar]
- Wangen, G. The Role of Malware in Reported Cyber Espionage A Review of the Impact and Mechanism. Information 2015, 6, 183–211. [Google Scholar] [CrossRef] [Green Version]
- Dara, S.; Zargar, S.T.; Muralidhara, V. Towards Privacy Preserving Threat Intelligence. J. Inf. Secur. Appl. 2017, 38, 28–39. [Google Scholar] [CrossRef]
- Skopik, F.; Pahi, T. Under False Flag: Using Technical Artifacts for Cyber Attack Attribution. Cybersecurity 2020, 3, 8. [Google Scholar] [CrossRef]
- Quintero-Bonilla, S.; del Rey, A.M. A New Proposal on the Advanced Persistent Threat: A Survey. Appl. Sci. 2020, 10, 3874. [Google Scholar] [CrossRef]
- Laurenza, G.; Lazzeretti, R.; Mazzotti, L. Malware Triage for Early Identification of Advanced Persistent Threat Activities. Assoc. Comput. Mach. 2020, 1, 2576–5337. [Google Scholar] [CrossRef]
- Zulkefli, Z.; Mahinderjit Singh, M. Sentient-Based Access Control Model A Mitigation Technique for Advanced Persistent Threats in Smartphones. J. Inf. Secur. Appl. 2020, 51, 102431. [Google Scholar] [CrossRef]
- Do Xuan, C.; Dao, M.H. A Novel Approach for APT Attack Detection Based on Combined Deep Learning Model. Neural Comput. Appl. 2021, 33, 13251–13264. [Google Scholar] [CrossRef]
- D’Orazio, C.J.; Choo, K.K.R. Circumventing IOS Security Mechanisms for APT Forensic Investigations: A Security Taxonomy for Cloud Apps. Future Gener. Comput. Syst. 2018, 79, 247–261. [Google Scholar] [CrossRef]
- Khosravi, M.; Ladani, B.T. Alerts Correlation and Causal Analysis for Apt Based Cyber Attack Detection. IEEE Access 2020, 8, 162642–162656. [Google Scholar] [CrossRef]
- Stojanović, B.; Hofer-Schmitz, K.; Kleb, U. APT Datasets and Attack Modeling for Automated Detection Methods: A Review. Comput. Secur. 2020, 92, 101734. [Google Scholar] [CrossRef]
- Zhang, R.; Zhu, Q. FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2026–2041. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Zolfaghari, B.; Azmoodeh, A.; Dehghantanha, A.; Karimipour, H.; Fraser, E.; Green, A.G.; Russell, C.; Duncan, E. A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures. Appl. Sci. 2021, 11, 7518. [Google Scholar] [CrossRef]
- Lajevardi, A.M.; Amini, M. Big Knowledge-Based Semantic Correlation for Detecting Slow and Low-Level Advanced Persistent Threats. J. Big Data 2021, 8, 148. [Google Scholar] [CrossRef]
- Li, S.; Zhang, Q.; Wu, X.; Han, W.; Tian, Z. Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. Secur. Commun. Netw. 2021, 2021, 9396141. [Google Scholar] [CrossRef]
- Feng, S.; Xiong, Z.; Niyato, D.; Wang, P. Dynamic Resource Management to Defend against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach. IEEE Trans. Cloud Comput. 2021, 9, 995–1007. [Google Scholar] [CrossRef]
- Pawlick, J.; Chen, J.; Zhu, Q. ISTRICT An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things. EEE Trans. Inf. Forensics Secur. 2018, 14, 1556–6013. [Google Scholar] [CrossRef] [Green Version]
- Cheng, X.; Zhang, J.; Tu, Y.; Chen, B. Cyber Situation Perception for Internet of Things Systems Based on Zero-Day Attack Activities Recognition within Advanced Persistent Threat. Concurr. Comput. 2020, 6001, 1–19. [Google Scholar] [CrossRef]
- Zimba, A.; Chen, H.; Wang, Z.; Chishimba, M. Modeling and Detection of the Multi-Stages of Advanced Persistent Threats Attacks Based on Semi-Supervised Learning and Complex Networks Characteristics. Future Gener. Comput. Syst. 2020, 106, 501–517. [Google Scholar] [CrossRef]
- Navarro, J.; Deruyver, A.; Parrend, P. A Systematic Survey on Multi-Step Attack Detection. Comput. Secur. 2018, 76, 214–249. [Google Scholar] [CrossRef]
- Ibor, A.E.; Epiphaniou, G. A Hybrid Mitigation Technique for Malicious Network Traffic Based on Active Response. Int. J. Secur. Appl. 2015, 9, 63–80. [Google Scholar] [CrossRef]
- Lajevardi, A.M.; Amini, M. A Semantic-Based Correlation Approach for Detecting Hybrid and Low-Level APTs. Future Gener. Comput. Syst. 2019, 96, 64–88. [Google Scholar] [CrossRef]
- Mehresh, R.; Upadhyaya, S. Surviving Advanced Persistent Threats in a Distributed Environment—Architecture and Analysis. Inf. Syst. Front. 2015, 17, 987–995. [Google Scholar] [CrossRef]
- Van Dijk, M.; Juels, A.; Oprea, A.; Rivest, R.L. FlipIt: The Game of “Stealthy Takeover”. J. Cryptol. 2013, 26, 655–713. [Google Scholar] [CrossRef] [Green Version]
- Koroniotis, N.; Moustafa, N.; Schiliro, F.; Gauravaram, P.; Janicke, H. A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access 2020, 8, 209802–209834. [Google Scholar] [CrossRef]
- Li, Y.; Dai, W.; Bai, J.; Gan, X.; Wang, J.; Wang, X. An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats. IEEE Trans. Inf. Forensics Secur. 2019, 14, 646–661. [Google Scholar] [CrossRef]
- Defense Evasion, Tactic TA0030—Mobile—MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0030/ (accessed on 23 March 2022).
- Credential Access, Tactic TA0031—Mobile—MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0031/ (accessed on 23 March 2022).
- Burnap, P.; French, R.; Turner, F.; Jones, K. Malware Classification Using Self Organising Feature Maps and Machine Activity Data. Comput. Secur. 2018, 73, 399–410. [Google Scholar] [CrossRef]
- Sha, L.; He, L.; Fu, J.; Sun, J.; Li, P. SDN-Based Sensitive Information (SI) Protection Sensitivity-Degree Measurement in Software and Data Lifetime Supervisor in Software Defined Network. Secur. Commun. Netw. 2015, 9, 1944–1957. [Google Scholar] [CrossRef]
- Bahrami, P.N.; Dehghantanha, A.; Dargahi, T.; Parizi, R.M.; Choo, K.K.R.; Javadi, H.H.S. Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. J. Inf. Process. Syst. 2019, 15, 865–889. [Google Scholar]
- Discovery, Tactic TA0032—Mobile—MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0032/ (accessed on 23 March 2022).
- Zambrano, P.; Torres, J.; Tello-Oquendo, L.; Jácome, R.; Benalcázar, M.E.; Andrade, R.; Fuertes, W. Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms An Information Security Approach. IEEE Access 2019, 7, 142129–142146. [Google Scholar] [CrossRef]
- Command and Control, Tactic TA0037—Mobile—MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0037/ (accessed on 23 March 2022).
- Shin, D. Network Anomaly Detection Using Memory-Augmented Deep Autoencoder. IEEE Access 2021, 9, 104695–104706. [Google Scholar]
- Zhao, G.; Xu, K.; Xu, L.; Wu, B. Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis. IEEE Access 2015, 3, 1132–1142. [Google Scholar] [CrossRef]
- Moon, D.; Kim, I.; Joo, J.W.; Im, H.J.; Park, J.H.; Jeong, Y.-S. Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing; Springer: Berlin/Heidelberg, Germany, 2015; pp. 1697–1710. [Google Scholar]
- Moustafa, N.; Choo, K.-K.R.; Radwan, I.; Camtepe, S. Outlier Dirichlet Mixture Mechanism Adversarial Statistical Learning for Anomaly Detection in the Fog. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1975–1987. [Google Scholar] [CrossRef]
- Xuan, C.D.; Duong, D.; Dau, H.X. A Multi-Layer Approach for Advanced Persistent Threat Detection Using Machine Learning Based on Network Traffic. J. Intell. Fuzzy Syst. 2021, 40, 11311–11329. [Google Scholar] [CrossRef]
- Xiao, L.; Xu, D.; Mandayam, N.B.; Poor, H.V. Attacker-Centric View of a Detection Game against Advanced Persistent Threats. IEEE Trans. Mob. Comput. 2018, 17, 2512–2523. [Google Scholar] [CrossRef]
- Wang, X.; Liu, Q.; Pan, Z.; Pang, G. APT Attack Detection Algorithm Based on Spatio-Temporal Association Analysis in Industrial Network. J. Ambient Intell. Humaniz. Comput. 2020, 45, 1–10. [Google Scholar] [CrossRef]
- Ghafir, I.; Hammoudeh, M.; Prenosil, V.; Han, L.; Hegarty, R.; Rabie, K.; Aparicio-Navarro, F.J. Detection of Advanced Persistent Threat Using Machine-Learning Correlation Analysis. Future Gener. Comput. Syst. 2018, 89, 349–359. [Google Scholar] [CrossRef] [Green Version]
- Moon, D.; Im, H.; Kim, I.; Park, J.H. DTB-IDS: An Intrusion Detection System Based on Decision Tree Using Behavior Analysis for Preventing APT Attacks. J. Supercomput. 2017, 73, 2881–2895. [Google Scholar] [CrossRef]
- Zimba, A.; Chen, H.; Wang, Z. Bayesian Network Based Weighted APT Attack Paths Modeling in Cloud Computing. Future Gener. Comput. Syst. 2019, 96, 525–537. [Google Scholar] [CrossRef]
- Huang, C.; Han, J.; Zhang, X.; Liu, J. Automatic Identification of Honeypot Server Using Machine Learning Techniques. Secur. Commun. Netw. 2019, 2019, 2627608. [Google Scholar] [CrossRef]
- Cheng, X.; Luo, Q.; Pan, Y.; Li, Z.; Zhang, J.; Chen, B. Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning. Secur. Commun. Netw. 2021, 2021, 8814068. [Google Scholar] [CrossRef]
- Achleitner, S.; La Porta, T.F.; Mcdaniel, P.; Sugrim, S.; Krishnamurthy, S.V.; Chadha, R. Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies. IEEE Trans. Netw. Serv. Manag. 2017, 14, 1098–1112. [Google Scholar] [CrossRef]
- Baksi, R.P.; Upadhyaya, S.J. Decepticon: A Theoretical Framework to Counter Advanced Persistent Threats. Inf. Syst. Front. 2021, 23, 897–913. [Google Scholar] [CrossRef]
- Neupane, R.L.; Neely, T.; Calyam, P.; Chettri, N.; Vassell, M.; Durairajan, R. Intelligent Defense Using Pretense against Targeted Attacks in Cloud Platforms. Future Gener. Comput. Syst. 2019, 93, 609–626. [Google Scholar] [CrossRef]
- Bakker, C.; Bhattacharya, A.; Chatterjee, S.; Vrabie, D.L. Metagames and Hypergames for Deception-Robust Control. ACM Trans. Cyber-Phys. Syst. 2021, 5, 1–25. [Google Scholar] [CrossRef]
- Wang, P.; Lin, W.-H.; Kuo, P.-T.; Lin, H.-T.; Wang, T.C. Threat Risk Analysis for Cloud Security Based on Attack-Defense Trees. In Proceedings of the 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), Seoul, Korea, 24–26 April 2012; Volume 2, pp. 106–111. [Google Scholar]
- Yang, L.-X.; Li, P.; Yang, X.; Tang, Y.Y. Security Evaluation of the Cyber Networks under Advanced Persistent Threats. IEEE Access 2017, 5, 20111–20123. [Google Scholar] [CrossRef]
- Javed, S.H.; Bin Ahmad, M.; Asif, M.; Almotiri, S.H.; Masood, K.; Al Ghamdi, M.A. An Intelligent System to Detect Advanced Persistent Threats in Industrial Internet of Things (I-IoT). Electronics 2022, 11, 742. [Google Scholar] [CrossRef]
- Fang, Y.; Wang, C.; Fang, Z.; Huang, C. LMTracker Lateral Movement Path Detection Based on Heterogeneous Graph Embedding. Neurocomputing 2022, 474, 37–47. [Google Scholar] [CrossRef]
- Panahnejad, M.; Mirabi, M. APT-Dt-KC: Advanced Persistent Threat Detection Based on Kill-Chain Model. J. Supercomput. 2022, 78, 8644–8677. [Google Scholar] [CrossRef]
- Li, H.; Wu, J.; Xu, H.; Li, G.; Guizani, M. Explainable Intelligence-Driven Defense Mechanism against Advanced Persistent Threats: A Joint Edge Game and AI Approach. IEEE Trans. Dependable Secur. Comput. 2022, 19, 757–775. [Google Scholar] [CrossRef]
- Wan, Z.; Cho, J.H.; Zhu, M.; Anwar, A.H.; Kamhoua, C.A.; Singh, M.P. Foureye: Defensive Deception against Advanced Persistent Threats via Hypergame Theory. IEEE Trans. Netw. Serv. Manag. 2022, 19, 112–129. [Google Scholar] [CrossRef]
- Aldini, A.; Seigneur, J.M.; Lafuente, C.B.; Titi, X.; Guislain, J. Design and Validation of a Trust-Based Opportunity-Enabled Risk Management System. Inf. Comput. Secur. 2017, 25, 1–31. [Google Scholar] [CrossRef]
- Hu, X.; Zhuang, Y. PHRiMA. A Permission-Based Hybrid Risk Management Framework for Android Apps. Comput. Secur. 2020, 94, 101791. [Google Scholar] [CrossRef]
- Popescu, T.M.; Popescu, A.M.; Prostean, G. Iot Security Risk Management Strategy Reference Model (Iotsrm2). Future Internet 2021, 13, 148. [Google Scholar] [CrossRef]
- Salih, F.I.; Abu Bakar, N.A.; Hassan, N.H.; Yahya, F.; Kama, N.; Shah, J. IoT Security Risk Management Model for Healthcare Industry. Malays. J. Comput. Sci. 2019, 3, 131–144. [Google Scholar]
- Abu Bakar, N.A.; Ramli, W.M.W.; Hafizah, H.N. The Internet of Things in Healthcare an Overview, Challenges and Model Plan for Security Risks Management Process. Indones. J. Electr. Eng. Comput. Sci. 2019, 15, 414–420. [Google Scholar] [CrossRef]
- Tomashchuk, O. Threat and Risk Management Framework for EHealth IoT Applications. In Proceedings of the SPLC ’20 24th ACM International Systems and Software Product Line Conference, Montreal, QC, Canada, 19–23 October 2020; Volume B. pp. 120–126. [Google Scholar]
- Sheehan, B.; Murphy, F.; Mullins, M.; Ryan, C. Connected and Autonomous Vehicles: A Cyber-Risk Classification Framework. Transp. Res. Part A Policy Pract. 2019, 124, 523–536. [Google Scholar] [CrossRef]
- Feng, S.; Xiong, Z.; Niyato, D.; Wang, P.; Leshem, A. Evolving Risk Management against Advanced Persistent Threats in Fog Computing. In Proceedings of the 2018 IEEE 7th International Conference on Cloud Networking, CloudNet, Tokyo, Japan, 22–24 October 2018. [Google Scholar]
- Russo, P.; Caponi, A.; Leuti, M.; Bianchi, G. A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management. Information 2019, 10, 242. [Google Scholar] [CrossRef] [Green Version]
- Chen, J.; Zhu, Q.; Başar, T. Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks. Dyn. Games Appl. 2021, 11, 294–325. [Google Scholar] [CrossRef]
- Gonzalez-Granadillo, G.; Menesidou, S.A.; Papamartzivanos, D.; Romeu, R.; Navarro-Llobet, D.; Okoh, C.; Nifakos, S.; Xenakis, C.; Panaousis, E. Automated Cyber and Privacy Risk Management Toolkit. Sensors 2021, 21, 5493. [Google Scholar] [CrossRef]
- Fugini, M.; Teimourikia, M.; Hadjichristofi, G. A Web-Based Cooperative Tool for Risk Management with Adaptive Security. Future Gener. Comput. Syst. 2016, 54, 409–422. [Google Scholar] [CrossRef]
- Ilvonen, I.; Jussila, J.J.; Kärkkäinen, H. Towards a Business-Driven Process Model for Knowledge Security Risk Management. Making Sense of Knowledge Risks. Int. J. Knowl. Manag. 2015, 11, 1–18. [Google Scholar] [CrossRef]
- Forouzandeh, M. Information Security Risk Management of Research Information Systems A Hybrid Approach of Fuzzy FMEA, AHP, TOPSIS and Shannon. J. Digit. Inf. Manag. 2019, 17, 321–336. [Google Scholar]
- Carvalho, G.H.; Woungang, I.; Anpalagan, A.; Traore, I. Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1260–1274. [Google Scholar] [CrossRef]
- Matta, G.; Chlup, S.; Shaaban, A.M.; Schmittner, C.; Pinzenöhler, A.; Szalai, E.; Tauber, M. Risk Management and Standard Compliance for Cyber-Physical Systems of Systems. Oduction InfoCommun. J. 2021, 13, 32–39. [Google Scholar] [CrossRef]
- Kure, H.I.; Islam, S.; Razzaque, M.A. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Appl. Sci. 2018, 8, 898. [Google Scholar] [CrossRef] [Green Version]
- Sancho, J.C.; Caro, A.; Ávila, M.; Bravo, A. New Approach for Threat Classification and Security Risk Estimations Based on Security Event Management. Future Gener. Comput. Syst. 2020, 113, 488–505. [Google Scholar] [CrossRef]
- Alavizadeh, H.; Jang-Jaccard, J.; Enoch, S.Y.; Al-Sahaf, H.; Welch, I.; Camtepe, S.A.; Kim, D.S. A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. Cryptogr. Secur. 2021, 1, 1–25. [Google Scholar]
- De Oliveira Albuquerque, R.; Villalba, L.J.G.; Orozco, A.L.S.; de Sousa, R.T., Jr.; Kim, T.-H. Leveraging Information Security and Computational Trust for Cybersecurity. J. Supercomput. 2016, 72, 3729–3763. [Google Scholar] [CrossRef]
- Dube, T.E.; Raines Richard, A.; Grimaila, M.R.; Bauer, K.W.; Rogers, S.K. Malware Target Recognition of Unknown Threats. IEEE Syst. J. 2012, 7, 467–477. [Google Scholar] [CrossRef]
- Khan, H.A.; Sehatbakhsh, N.; Nguyen, L.N.; Callan, R.; Yeredor, A.; Prvulovic, M.; Zajiic, A. IDEA Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1545–5971. [Google Scholar] [CrossRef]
- Execution, Tactic TA0041—Mobile_MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0041/ (accessed on 23 March 2022).
- Persistence, Tactic TA0028—Mobile—MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0028/ (accessed on 23 March 2022).
- Privilege Escalation, Tactic TA0029—Mobile|MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0029/ (accessed on 23 March 2022).
- Impact, Tactic TA0034—Mobile—MITRE ATT&CK®. Available online: https://attack.mitre.org/tactics/TA0034/ (accessed on 23 March 2022).
- Fan, M.; Li, S.; Han, W.; Wu, X.; Gu, Z.; Tian, Z. A Novel Malware Detection Framework Based on Weighted Heterograph. In Proceedings of the CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies, Guangzhou China, 4–6 December 2020; pp. 39–43. [Google Scholar]
- Kumar, R.; Singh, S.; Kela, R. Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review. IFIP Adv. Inf. Commun. Technol. 2022, 636, 45–69. [Google Scholar]
- Abbass, W.; Bakraouy, Z.; Baina, A.; Bellafkih, M. Intelligent Risk Management Framework. IAES Int. J. Artif. Intell. 2019, 8, 278–285. [Google Scholar] [CrossRef]
- Mwiki, H.; Dargahi, T.; Dehghantanha, A.; Choo, K.K.R. Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin. Adv. Sci. Technol. Secur. Appl. 2019, 221–244. [Google Scholar]
- Matrix—Enterprise|MITRE ATT&CK®. Available online: https://attack.mitre.org/matrices/enterprise/ (accessed on 20 March 2022).
- How Cognitive Bias Leads to Reasoning Errors in Cybersecurity—Forcepoint. Available online: https://www.forcepoint.com/blog/insights/how-cognitive-bias-leads-reasoning-errors-cybersecurity (accessed on 23 March 2022).
- Thinking About Thinking: Exploring Bias in Cybersecurity with Insights from Cognitive Science. Available online: https://www.forcepoint.com/resources/reports/thinking-about-thinking-exploring-bias-cybersecurity-insights-cognitive-science (accessed on 20 March 2022).
- Barrett, P.M. Framework for Improving Critical Infrastructure Cybersecurity; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018.
- Vasconcellos, S. Implement and Improve Your CyberSecurity Program in 5 Steps. Available online: https://clarknuber.com/resource/implement-and-improve-your-cybersecurity-program-in-5-steps/ (accessed on 20 March 2022).
- Yang, L.X.; Huang, K.; Yang, X.; Zhang, Y.; Xiang, Y.; Tang, Y.Y. Defense against Advanced Persistent Threat through Data Backup and Recovery. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2001–2013. [Google Scholar] [CrossRef]
- Andrade, R.O.; Yoo, S.G. Cognitive Security: A Comprehensive Study of Cognitive Science in Cybersecurity. J. Inf. Secur. Appl. 2019, 48, 102352. [Google Scholar] [CrossRef]
- Bodström, T.; Hämäläinen, T. A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory. In Proceedings of the Computational Data and Social Networks: 7th International Conference, CSoNet 2018, Shanghai, China, 18–20 December 2018; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer: Berlin/Heidelberg, Germany, 2018; Volume 11280, pp. 498–509. [Google Scholar]
- Sonderen, T. A Manual for Attack Trees; University of Twente: Enschede, The Netherlands, 2019. [Google Scholar]
Characteristics | Advanced Persistent Threats | Traditional Malware Attacks |
---|---|---|
Attack definition | APT is a highly sophisticated, well-organized, and well-targeted attack (e.g., Stuxnet). | The term “malware” refers to software intended to attack and disrupt digital systems (e.g., ransomware). |
Attacker | Government actors and organized criminal groups | A cracker (a hacker in illegal activities). |
Target | Targets a wide range of businesses and organizations, including diplomatic organizations, the information technology sector, and others. | Targets any personal or business device. |
Purpose | The purpose of this attack is to damage a specified target or steal sensitive data. | The purpose of this attack is financial gain. |
Attack life cycle | Maintain persistence as possible using different conceal tools. | The malware is eliminated when it is identified via security tools (e.g., anti-virus software). |
Model | Focus |
---|---|
SAM (Situational Awareness Model) | Cognitive decision-making |
OODA Loop (Observe–Orient–Decide–Act) | Cognitive decision-making |
JDL DFM (JDL Data Fusion Model) | Processing and fusion of data and SA |
CSAM (Cyber Situational Awareness Model) | Business continuity planning and CSA |
SARM (Situational Awareness Reference Model) | Situational awareness |
ECSA (Effective Cyber Situational Awareness) | CSA in computer networks |
Population | APT Attack Defense |
---|---|
Intervention | APT defense mechanisms |
Comparison | Not available |
Outcomes | Device behavior-based APT detection |
Context | Review the existing studies of device behavior-based APT detection |
References | APT Features | ATT&CK |
---|---|---|
[1,3,7,28,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100] | Spear phishing | Initial access |
[3,28,79,84,88,99,101,102] | Watering hole | |
[3,28,79,84,88,99,101,102] | Malware | |
[1,3,88,89,102,103,104,105] | Application repackaging | |
[106] | Attacks on an Internet-facing server | |
[3,83,89,101] | Removable device | |
[3,89,107] | Drive-by download | |
[96] | Spoofing attack | |
[7,82,108] | SQL injection | Execution |
[3,5,82,84,86,87,88,90,94,97,101,109,110,111,112,113,114] | Zero day, known vulnerability | |
[79,101,115] | Remote code execution/Code injection | |
[116] | User to Root (U2R) | Persistence |
[116] | User to Root (U2R) | Privilege escalation |
[6] | Unauthorized access | Defense evasion |
[108] | Buffer overflow | |
[28] | Brute force | Credential access |
[28] | Pass hash | |
[79,82,83,117,118] | Man-in-the-middle | |
[119] | Password cracking | |
[120] | Eavesdropping | |
[78,80,81,82,85,87,97,105,107,111,121,122,123] | Social engineering | Discovery |
[124] | Probe | |
[100,125] | Lateral/Internal spear-phishing emails | Lateral movement |
[108] | Data leakage | Collection |
Cloud data leakage. | ||
[126] | Removable device | C&C and Exfiltration |
Tunneling over protocol | ||
[3,76,79,81,92,97,111,115,124,125,126,127,128,129,130] | DOS | Impact |
[4,82,131] | Botnet | |
[108] | Software update | |
Data fabrication |
Technique Used | Component | Platform | APT Defense Mechanisms |
---|---|---|---|
Global abnormal forest (GAF) [3] | Network | Mobile and computer | D |
Mobile secure manager (MSM), analyzer (static and dynamic analysis) [132] | Human behavior | Mobile | D |
Federated learning algorithm [5] | Application | Mobile | D |
Naïve Bayes classifier [28] | Application | IoT | D |
Domain generation algorithm (DGA) [79] | Network | IoT | D |
Deep autoencoder [6] | Network | IoT | D |
Genetic programming, classification and regression trees, support vector machines, and dynamic Bayesian game model [1] | Network | IoT | D |
Maximum connected subgraph algorithm [7] | Network | IoT | D |
AutoEncoder and 1D CNN (1-Dimension Convolutional Neural Network) [81] | Application | IoT | D |
Prospect Theoretic Game [82] | Network | IoT | D |
Random forest (RF) [83] | Network | Unmanned aerial vehicles (UAVs) | D |
Outlier Dirichlet Mixture (ODM-ADS) mechanism [133] | Network | Fog computing | D |
Random forest (RF), support vector machine (SVM), and multi-layer perceptron (MLP) [134] | Network | General | D |
Multi-layer perceptron (MLP), convolutional neural network (CNN), and long short-term memory (LSTM) [103] | Network | General | D |
Cumulative prospect theory (CPT) [135] | Network | General | D |
Malicious IP address detection module (MIPD), malicious Secure Sockets Layer (SSL) certificate detection module (MSSLD), domain-flux detection module (DFD), and Tor connection detection module (TorD) [84] | Network | General | D |
Semantic event correlation [117] | Device and Network | Computer | D |
Dynamic programming algorithm [105] | Device | Computer | D |
Support vector machine (SVM) [136] | Network | Computer | D |
Signature-based and anomaly-based detection technology [131] | Network | Computer | D |
Threat detection (disguised executable file detection (DeFD), malicious file hash detection (MFHD), malicious domain name detection (MDND), malicious IP address detection (MIPD), malicious SSL certificate detection (MSSLD), domain flux detection (DFD), scan detection (SD), and Tor connection detection (TorCD)) Alert correlation (Alerts filter (AF), clustering of alerts (AC), and correlation indexing (CI)) Attack prediction (machine-learning-based prediction module (PM)) [137] | Network | Computer | D |
Decision tree [138] | Device | Computer | D |
Memory-augmented deep auto-encoder (MemAE) [130] | Network | Computer | D |
Random forest classifier [85] | Application | Computer | D |
Vermiform window, scalable inference engine called SANSA, and ontology-based data abstraction [109] | Device | Computer | D |
Bayesian networks [139] | Network | General | D |
Random forest algorithms [110] | Application | IoT | D |
Random forest classifier [86] | Application | Computer | D |
Self-organizing feature maps [124] | Application | Computer | D |
Vectorized mobile ATT&CK matrix and the indicator pairing technique [87] | Application | Mobile | D |
Random forest (RF) [140] | Network | IoT | D |
Manhattan distance and metric distance algorithms [88] | Application | Computer | D |
Random forest and isolation forest [101] | Application | Computer | D |
Passive network monitoring, in-host auditing subsystem monitoring [89] | Network and device | General | D |
Federated learning algorithm, differentially private data perturbation mechanism [141] | Network | IoT | D |
Hierarchical clustering algorithm [90] | Network | IoT | D |
Reconnaissance deception system (RDS) [142] | Network | Computer | M |
Hidden Markov model (HMM) [143] | Network | IoT | M |
Pretense theory [144] | Network | Cloud computing | M |
Metagames and hypergames [145] | Network | Computer | M |
Data-centric security approach–Ciphertext Policy-Attribute-based Encryption(CP-ABER-LWE) scheme [4] | Device | IoT | P |
Analytic hierarchy process (AHP) and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) model, and the OpenFlow technique [125] | Network | General | P |
Lyapunov-based intelligence-driven security-aware defense mechanism [121] | Network | Computer | P |
Trusted Platform Module [118] | Network | Computer | P |
Cyber risk management (cyber-insurance) and game theory (dynamic Stackelberg game) [111] | Network | Fog computing | I |
Cyber risk management (cyber-insurance) and game theory (FlipIn game) [107] | Network | IoT | I |
Role- and attribute-based access control and multilevel security model [102] | Device | Mobile | P |
J48, Boyer-Moore algorithm, and k-NN (k Nearest Neighbor) algorithm [116] | Network | Computer | D&R |
Attack-defense trees (ADT) approach [146] | Network | Computer | I |
Bayesian network model [91] | Network | Cloud computing | P |
Strategic trust, game theory (signaling game and the FlipIt game) [92] | Network | Computer | P |
Multi-layer framework (iSTRICT) and associated equilibrium concept (GNE), and an adaptive algorithm [112] | Network | IoT | P |
Security information event management system (IBM Q-radar) [93] | Network | General | I |
Individual-level continuous-time dynamic model [147] | Network | Computer | D |
Zero-day attacks activity recognition method, malicious C&C DNS mining method (MCCDRM), and purpose-oriented situation-aware access control [113] | Network | IoT | D |
Adaboost classifier [148] | Network | IIoT | D |
AutoEncoder [149] | Network | Computer | D |
Bayesian classification algorithm and fuzzy analytical hierarchy process [150] | Network | General | D |
Bayesian Stackelberg game [151] | Network | General | D |
Hypergame theory [152] | Network | General | M |
Approach | Platform | Attack Type |
---|---|---|
Opportunity-enabled risk management (OPPRIM) methodology [153] | Mobile | Cyber-attack |
Permission-based Hybrid Risk Management framework for Android apps (PHRiMA) [154] | Mobile | privilege-induced attack |
Bi-level game-theoretic framework [107] | IoT | APT |
Intelligent risk management framework [146] | IoT | DDOS and SQL injections attacks |
IoT security risk management strategy reference model (IoTSRM2) [155] | IoT | Cyber-attack |
IoT risk management model [156] | IoT | Cyber-attack |
IoT security risk model [157] | IoT | Cyber-attack |
Threat and risk management framework [158] | IoT | Cyber-attack |
Proactive CAV cyber-risk classification model [159] | Connected and Autonomous Vehicle (CAV) | Cyber-attack |
Cyber risk management (cyber-insurance) tool [160] | Fog computing | APT |
Cyber risk vulnerability management (CYRVM) platform [161] | General | Cyber-attack |
Bi-level mechanism [162] | General | Cyber-attack |
AMBIENT (Automated Cyber and Privacy Risk Management Toolkit) [163] | General | Cyber-attack |
Information security risk management situation aware ISRM (SA-ISRM) model [61] | General | Cyber-attack |
Risk and dynamic access control tool [164] | General | Cyber-attack |
Knowledge security risk management model [165] | General | Cyber-attack |
Information security risk management (ISRM) [166] | General | Cyber-attack |
Semi-Markov decision process framework [167] | 5G edge-cloud ecosystem | (DoS) attack |
Risk management framework [168] | Cyber-physical systems | Cyber-attack |
Integrated cyber-security risk management framework [169] | Cyber-physical Systems | Cyber-attack |
Security information event management system (IBM Q-radar) [93] | General | APT |
Cyber risk management (cyber-insurance) and dynamic Stackelberg game [111] | Fog computing | APT |
Viewnext-UEx model [170] | Computer | Cyber-attack |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jabar, T.; Mahinderjit Singh, M. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Sensors 2022, 22, 4662. https://doi.org/10.3390/s22134662
Jabar T, Mahinderjit Singh M. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Sensors. 2022; 22(13):4662. https://doi.org/10.3390/s22134662
Chicago/Turabian StyleJabar, Thulfiqar, and Manmeet Mahinderjit Singh. 2022. "Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework" Sensors 22, no. 13: 4662. https://doi.org/10.3390/s22134662