Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique

The shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, e...

Full description

Bibliographic Details
Main Author: Ali Mohamed, Nachaat Abdelatif
Format: Thesis
Language:English
Published: 2022
Subjects:
Online Access:http://eprints.usm.my/59238/
Abstract Abstract here
_version_ 1854969261657686016
author Ali Mohamed, Nachaat Abdelatif
author_facet Ali Mohamed, Nachaat Abdelatif
author_sort Ali Mohamed, Nachaat Abdelatif
description The shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. Current security measures of addressing APT attack involve detecting the attacks long after it has happened and failed to provide proactive responses. The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.
first_indexed 2025-10-17T08:45:34Z
format Thesis
id usm-59238
institution Universiti Sains Malaysia
language English
last_indexed 2025-10-17T08:45:34Z
publishDate 2022
record_format eprints
record_pdf Abstract
spelling usm-592382023-08-24T00:03:45Z http://eprints.usm.my/59238/ Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique Ali Mohamed, Nachaat Abdelatif QA75.5-76.95 Electronic computers. Computer science The shift from the manual approach of processing data to the digitized method has made organizational data prone to various attacks by cybercriminals. Advanced Persistent Threat (APT) is a recent threat that has ravaged many industries and governments. APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. Current security measures of addressing APT attack involve detecting the attacks long after it has happened and failed to provide proactive responses. The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem. 2022-04 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/59238/1/24%20Pages%20from%20NACHAAT%20ABDELATIF%20ALI%20MOHAMED%20-%20TESIS.pdf Ali Mohamed, Nachaat Abdelatif (2022) Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique. PhD thesis, Perpustakaan Hamzah Sendut.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Ali Mohamed, Nachaat Abdelatif
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
title Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
title_full Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
title_fullStr Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
title_full_unstemmed Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
title_short Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
title_sort rule based approach for detecting advanced persistent threat using behavioral features of credential dumping technique
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/59238/
work_keys_str_mv AT alimohamednachaatabdelatif rulebasedapproachfordetectingadvancedpersistentthreatusingbehavioralfeaturesofcredentialdumpingtechnique