Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework

During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and ava...

Full description

Bibliographic Details
Main Authors: Thulfiqar Jabar, Manmeet Mahinderjit Singh
Format: Article
Language:English
Published: MDPI AG 2022-06-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/13/4662
_version_ 1797433997284868096
author Thulfiqar Jabar
Manmeet Mahinderjit Singh
author_facet Thulfiqar Jabar
Manmeet Mahinderjit Singh
author_sort Thulfiqar Jabar
collection DOAJ
description During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and availability (CIA) of the information. One attack that occurs is Advanced Persistent Threat (APT). Attackers can manipulate a device’s behavior, applications, and services. Such manipulations lead to signification of a deviation from a known behavioral baseline for smartphones. In this study, the authors present a Systematic Literature Review (SLR) to provide a survey of the existing literature on APT defense mechanisms, find research gaps, and recommend future directions. The scope of this SLR covers a detailed analysis of most cybersecurity defense mechanisms and cutting-edge solutions. In this research, 112 papers published from 2011 until 2022 were analyzed. This review has explored different approaches used in cybersecurity and their effectiveness in defending against APT attacks. In a conclusion, we recommended a Situational Awareness (SA) model known as Observe–Orient–Decide–Act (OODA) to provide a comprehensive solution to monitor the device’s behavior for APT mitigation.
first_indexed 2024-03-09T10:24:59Z
format Article
id doaj.art-220bbf2119464e858802d4265c88354c
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T10:24:59Z
publishDate 2022-06-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-220bbf2119464e858802d4265c88354c2023-12-01T21:41:11ZengMDPI AGSensors1424-82202022-06-012213466210.3390/s22134662Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual FrameworkThulfiqar Jabar0Manmeet Mahinderjit Singh1School of Computer Science, Universiti Sains Malaysia, Gelugor 11800, Penang, MalaysiaSchool of Computer Science, Universiti Sains Malaysia, Gelugor 11800, Penang, MalaysiaDuring the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and availability (CIA) of the information. One attack that occurs is Advanced Persistent Threat (APT). Attackers can manipulate a device’s behavior, applications, and services. Such manipulations lead to signification of a deviation from a known behavioral baseline for smartphones. In this study, the authors present a Systematic Literature Review (SLR) to provide a survey of the existing literature on APT defense mechanisms, find research gaps, and recommend future directions. The scope of this SLR covers a detailed analysis of most cybersecurity defense mechanisms and cutting-edge solutions. In this research, 112 papers published from 2011 until 2022 were analyzed. This review has explored different approaches used in cybersecurity and their effectiveness in defending against APT attacks. In a conclusion, we recommended a Situational Awareness (SA) model known as Observe–Orient–Decide–Act (OODA) to provide a comprehensive solution to monitor the device’s behavior for APT mitigation.https://www.mdpi.com/1424-8220/22/13/4662Situational Awareness (SA)Observe–Orient–Decide–Act (OODA)risk managementtrust managementzero trustthreat modeling
spellingShingle Thulfiqar Jabar
Manmeet Mahinderjit Singh
Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
Sensors
Situational Awareness (SA)
Observe–Orient–Decide–Act (OODA)
risk management
trust management
zero trust
threat modeling
title Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
title_full Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
title_fullStr Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
title_full_unstemmed Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
title_short Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework
title_sort exploration of mobile device behavior for mitigating advanced persistent threats apt a systematic literature review and conceptual framework
topic Situational Awareness (SA)
Observe–Orient–Decide–Act (OODA)
risk management
trust management
zero trust
threat modeling
url https://www.mdpi.com/1424-8220/22/13/4662
work_keys_str_mv AT thulfiqarjabar explorationofmobiledevicebehaviorformitigatingadvancedpersistentthreatsaptasystematicliteraturereviewandconceptualframework
AT manmeetmahinderjitsingh explorationofmobiledevicebehaviorformitigatingadvancedpersistentthreatsaptasystematicliteraturereviewandconceptualframework