REVIEW OF APT ATTACKS: HOW BIG DATA FIGHTES BACK

Abstract

 Now a days, threat of previously unknown cyber-attacks are increasing because existing security systems are not able to detect them. The cyber-attacks had simple purposes of leaking personal information by attacking the PC or to reduce the system. The aim of recent heavy blows. attacks has changed from leaking information and destruction of services to attacking big data systems such as critical infrastructures and state agencies. Previous defense technologies to measure these attacks are based on patterns matching methods which are very limited. Because of this reality, In the occurrence of new and previously unknown attack, detections rate become very low and false negative increases. To keep secure from these unknown attacks, which unable to detected with existing technology, We proposed new model based on big data analysis techniques that can take out information from a variety of sources to detect future attacks. Respecting the model on the basis of the future Advanced Persistent Threat (APT) detection and prevention system execution

Authors and Affiliations

Rukhsana Ambreen*

Keywords

Related Articles

 SALIENT REGION DETECTION BASED ON AVERAGE SALIENCY MAP WITH SPATIAL VARIANCE

 Salient region detection is one of a pre-processing method which are useful for several image processing application. Image processing application includes image retrieval, object recognition, face recognition...

 A SURVEY OF DATA COMPRESSION TECHNIQUES

 Most digital data are not stored in the most compact form. Rather, they are stored in whatever way makes them easiest to use, such as: ASCII text from word processors, binary code that can be executed on a compute...

 AVAILABLE FOOD AND ANTS’ RESPONSE

 Ants are habituated to search food here and there in their foraging ground. To note their response in respect to available foods various types of foods in different sizes and numbers were offered at certain sites...

 Performance of Biomass Adsorber Column for Competitive Removal Pb(II), Cr(III) and Cd(II) ions from Synthetic Wastewater

 The adsorption of Pb(II), Cr(III) and Cd(II) onto dead anaerobic biomass (DAB) in single, binary and ternary system was studied using fixed bed adsorber. A general rate multi- component model (GRM) was utilized to...

 INTELLIGENT SECURITY SYSTEM USING IMAGE PROCESSING

 Now a days, security systems are meant only for the purpose of recording the images like cc cameras or for giving some alerts to the security officers about the theft. But, they won’t take any action on the th...

Download PDF file
  • EP ID EP159639
  • DOI 10.5281/zenodo.154215
  • Views 111
  • Downloads 0

How To Cite

Rukhsana Ambreen* (30).  REVIEW OF APT ATTACKS: HOW BIG DATA FIGHTES BACK. International Journal of Engineering Sciences & Research Technology, 5(9), 385-389. https://europub.co.uk/articles/-A-159639