The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.11)
pp: 54-61
Aditya K Sood , Michigan State University
Richard J. Enbody , Michigan State University
ABSTRACT
Targeted cyberattacks play an increasingly significant role in disrupting the online social and economic model, not to mention the threat they pose to nation-states. A variety of components and techniques come together to bring about such attacks.
INDEX TERMS
Privacy, Malware, Internet, Electronic mail, Computer crime, Routing protocols, Targeting, Social network services, Economics, advanced persistent threats, cybercrime, cyber warfare, targeted attacks
CITATION
Aditya K Sood, Richard J. Enbody, "Targeted Cyberattacks: A Superset of Advanced Persistent Threats", IEEE Security & Privacy, vol.11, no. 1, pp. 54-61, Jan.-Feb. 2013, doi:10.1109/MSP.2012.90
REFERENCES
1. F. Li, A. Lai, and D. Ddl, “Evidence of Advanced Persistent Threat: A Case Study of Malware for Political Espionage,” 6th Int'l Conf. Malicious and Unwanted Software (Malware 11), IEEE, 2011, pp. 102–109.
2. M. Cova, C. Kruegel, and G. Vigna, “Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code,” Proc. 19th Int'l Conf. World Wide Web, ACM, 2012; http://doi.acm.org/10.11451772690.1772720 .
3. A.K Sood and R.J. Enbody, “Browser Exploit Packs—Death by Bundled Exploits,” Proc. 21st Virus Bulletin Conf., 2011; http://secniche.blogspot.com/2011/10virus-bulletin-2011-conference-browser.html .
4. R. Branco, “Into the Darkness: Dissecting Targeted Attacks,” Qualys Blog, Nov. 2011; https://community.qualys.com/blogs/securitylabs/ 2011/11/30dissecting-targeted-attacks .
5. M. Balduzzi et al., “A Security Analysis of Amazon's Elastic Compute Cloud Service,” Proc. 27th Ann. ACM Symp. Applied Computing, ACM, 2012; http://doi.acm.org/10.11452245276.2232005 .
6. P. Ferrie and P. Szor, “Cabirn Fever,” Virus Bulletin Magazine, Aug. 2004; http://vallejo.cc/proyectos/cabircabir.pdf .
7. H. Binsallee et al., “On the Analysis of the Zeus Botnet Crimeware Toolkit,” IEEE 8th Ann. Conf. Privacy, Security and Trust (PST), IEEE, 2010; http://ieeexplore.ieee.org/stampstamp.jsp?tp=&arnumber=5593240&isnumber=5593224 .
8. A.K Sood and R.J. Enbody, “Browser User Interface Design Flaws,” Crosstalk, May 2011; www.crosstalkonline.org/storage/issue-archives/ 2011/201105201105-Sood.pdf.
9. H. Okhravi, J.W. Haines, and K. Ingols, “Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target,” High Frontier: The Journal for Space and Cyberspace Professionals, May 2011; http://web.mit.edu/ha22286/www/papers/journal Achieving_Cyber_Survivability_in_a_Contested_Environment_Using_a_Cyber_Moving_Target.pdf .
10. N. Christin, “On Critical Infrastructure Protection and International Agreements,” School of Public Policy, Univ. of Maryland, Mar. 2011; www.cissm.umd.edu/papers/fileson_critical_infrastructure_protection_and_international_agreements__033111__final.pdf .
11. W. Huang, C. Hsiao, and N. Lin, “Mass Meshing Injection: Sidename.js (now cssminibar.js) Ongoing,” Armorize Malware Blog, 15 June 2011; http://blog.armorize.com/2011/06mass-meshing-injection-sidenamejs.html .
12. W. Huang, C. Hsiao, and N. Lin, “Malvertising on Google Doubleclick Ongoing,” Armorize Malware Blog, 25 Aug. 2011; http://blog.armorize.com/2011/08malvertising-on-google-doubleclick.html .
13. A. Stavrou and Z. Wang, “Exploiting Smart-Phone USB Connectivity for Fun and Pro?t,” BlackHat DC Conf., 2011; https://media.blackhat.com/bh-dc-11/Stavrou-Wang BlackHat_DC_2011_Stavrou_Zhaohui_USB_exploits-wp.pdf .
14. J. Rutkowska, “Thoughts about Trusted Computing,” EuSecWest Conf., 2009; http://invisiblethingslab.com/resources/ misc09trusted_computing_thoughts.pdf.
15. “McAfee Threats Report: First Quarter 2012,” McAfee, 2012; www.mcafee.com/hk/resources/reportsrp-quarterly-threat-q1-2012.pdf .
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool