Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    A Hybrid Feature Selection Method for Advanced Persistent Threat Detection

    Adam Khalid1, Anazida Zainal1, Fuad A. Ghaleb2, Bander Ali Saleh Al-rimy3, Yussuf Ahmed2,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5665-5691, 2025, DOI:10.32604/cmc.2025.063451 - 30 July 2025

    Abstract Advanced Persistent Threats (APTs) represent one of the most complex and dangerous categories of cyber-attacks characterised by their stealthy behaviour, long-term persistence, and ability to bypass traditional detection systems. The complexity of real-world network data poses significant challenges in detection. Machine learning models have shown promise in detecting APTs; however, their performance often suffers when trained on large datasets with redundant or irrelevant features. This study presents a novel, hybrid feature selection method designed to improve APT detection by reducing dimensionality while preserving the informative characteristics of the data. It combines Mutual Information (MI), Symmetric… More >

  • Open Access

    ARTICLE

    Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning

    Mathew Nicho1,2,*, Oluwasegun Adelaiye3, Christopher D. McDermott4, Shini Girija5

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 281-308, 2025, DOI:10.32604/cmc.2025.059597 - 26 March 2025

    Abstract The successful penetration of government, corporate, and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace. Advanced Persistent Threat (APT) attacks continue to pose significant challenges for organizations despite technological advancements in artificial intelligence (AI)-based defense mechanisms. While AI has enhanced organizational capabilities for deterrence, detection, and mitigation of APTs, the global escalation in reported incidents, particularly those successfully penetrating critical government infrastructure has heightened concerns among information technology (IT) security administrators and decision-makers. Literature review has identified the stealthy lateral movement (LM) of malware within the initially… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques

    Singamaneni Krishnapriya*, Sukhvinder Singh

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2675-2719, 2024, DOI:10.32604/cmc.2024.052447 - 15 August 2024

    Abstract The increase in number of people using the Internet leads to increased cyberattack opportunities. Advanced Persistent Threats, or APTs, are among the most dangerous targeted cyberattacks. APT attacks utilize various advanced tools and techniques for attacking targets with specific goals. Even countries with advanced technologies, like the US, Russia, the UK, and India, are susceptible to this targeted attack. APT is a sophisticated attack that involves multiple stages and specific strategies. Besides, TTP (Tools, Techniques, and Procedures) involved in the APT attack are commonly new and developed by an attacker to evade the security system.… More >

  • Open Access

    ARTICLE

    Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model

    U. Sakthivelu, C. N. S. Vinoth Kumar*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3691-3707, 2023, DOI:10.32604/iasc.2023.036946 - 15 March 2023

    Abstract The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s livelihood. Several cyber-attacks lead to the compromise of data security. The proposed system offers complete data protection from Advanced Persistent Threat (APT) attacks with attack detection and defence mechanisms. The modified lateral movement detection algorithm detects the APT attacks, while the defence is achieved by the Dynamic Deception system that makes use of the belief update algorithm. Before termination, every cyber-attack undergoes multiple stages, with the most prominent stage being Lateral Movement (LM). The LM uses… More >

  • Open Access

    ARTICLE

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    Yussuf Ahmed1,*, A.Taufiq Asyhari1, Md Arafatur Rahman2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2497-2513, 2021, DOI:10.32604/cmc.2021.014223 - 05 February 2021

    Abstract The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks. This is primarily due to the sophistication of the attacks and the availability of powerful tools. Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities. Over the last few years, we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks. Edge technology brings… More >

Displaying 1-10 on page 1 of 5. Per Page