Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior
Recent stealth attacks cleverly disguise malicious activities, masquerading as ordinary connections to popular online services through seemingly innocuous applications. These methods often evade detection by traditional network monitoring or signature-based techniques, as attackers frequently hide C...
Main Authors: | Yangzong Zhang, Wenjian Liu, Kaiian Kuok, Ngai Cheong |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10380608/ |
Similar Items
-
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
by: George Karantzas, et al.
Published: (2021-07-01) -
A New Proposal on the Advanced Persistent Threat: A Survey
by: Santiago Quintero-Bonilla, et al.
Published: (2020-06-01) -
New record of giant anteater Myrmecophaga tridactyla (Pilosa, Myrmecophagidae) in Northeast Brazil
by: Douglas de Matos Dias, et al.
Published: (2019-04-01) -
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution
by: Hamed Haddadpajouh, et al.
Published: (2020-01-01) -
Nation-State Threat Actor Attribution Using Fuzzy Hashing
by: Michal Kida, et al.
Published: (2023-01-01)