A4 Article in conference proceedings
APT Cyber-attack Modelling : Building a General Model (2022)


Lehto, M. (2022). APT Cyber-attack Modelling : Building a General Model. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security (17, pp. 121-129). Academic Conferences International Ltd. The proceedings of the 17th international conference on cyber warfare and security. https://doi.org/10.34190/iccws.17.1.36


JYU authors or editors


Publication details

All authors or editorsLehto, Martti

Parent publicationICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security

Parent publication editorsGriffin, Robert P.; Tatarand, Unal; Yankson, Benjamin

Conference:

  • International Conference on Cyber Warfare and Security

Place and date of conferenceAlbany, New York, USA17.-18.3.2022

ISBN978-1-914587-26-9

Journal or seriesThe proceedings of the 17th international conference on cyber warfare and security

ISSN2048-9870

eISSN2048-9889

Publication year2022

Volume17

Issue number1

Pages range121-129

Number of pages in the book645

PublisherAcademic Conferences International Ltd

Place of PublicationReading

Publication countryUnited Kingdom

Publication languageEnglish

DOIhttps://doi.org/10.34190/iccws.17.1.36

Publication open accessOpenly available

Publication channel open accessOpen Access channel

Publication is parallel published (JYX)https://jyx.jyu.fi/handle/123456789/80120


Abstract

The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early warning ability. Threats in cyberspace are difficult to define, as it is hard to identify the source of attacks and the motives that drive them, or even to foresee the course of an attack as it unfolds. The identification of cyber threats is further complicated by the difficulty in defining the boundaries between national, international, public, and private interests. Because threats in cyberspace are global in nature and involve rapid technological developments, the struggle to respond them is ever-changing and increasingly complicated. Cyber-attack models describe the structure of an attack in different phases. They provide a means to conceptualize the different aspects and elements of an attack. However, it is important to understand that not all attacks must complete all phases to be successful, and the objective of the attack defines the structure of the attack. Different actors have built different cyber-attack models. Modeling is used to understand the different goals of cyber attackers. Attack models are based on attack targets and attack objectives. This paper analyzes different APT cyber-attack models and presents a general cyber-attack model.


Keywordscyber securitycyber crimecyber attacksnetcrimedata securityprecautionary measuresmodelling (representation)

Free keywordscyber-attack model; APT attack; cyber security


Contributing organizations


Ministry reportingYes

Reporting Year2022

JUFO rating1


Last updated on 2024-03-04 at 19:05