APT Detection through
Introduction
The field of cybersecurity is always evolving, and that’s not always a good thing. Specifically
when it comes to Advanced Persistent Threats (APTs), there seem to be endless ways around
the technology we have today. These schemes are made to trick traditional security systems, so
new detection techniques must be developed. In this review, we’ll go over some of the reasons
why these attacks can go unnoticed and create such a big problem. As well as how this study
can contribute to making our data safer.
Hypotheses
The study brings up several hypotheses about APT detection methods:
H1: There are multiple ways to detect an APT attack but all have varying degrees of
effectiveness.
H2: Not every method works on any attack, there are specific vulnerabilities or attributes that
make some more difficult than others.
H3: Multi-stage attacks are extremely difficult or outright impossible to prevent thanks to their
complicated design and ability to dodge traditional security measures.
H4: The recent advancements in technology have changed how APTs work, meaning only
studies and industry work from January 2015 through April 2020 will reflect the modern state
of these attacks.
Analysis and Methodologies
Thematic analysis helps researchers identify trends in APT detection techniques. Classification-
based analysis takes different approaches and separates them so they can be studied
individually. Data synthesis focuses on multi-stage behaviors and aids in understanding them
along with effective detections methods. All of these methodologies show how carefully they’re
integrating technology into their research.
In class relations
We’ve discussed privacy and data security before. We’ve also talked about digital divide along
with cybersecurity workforce diversity. All important topics that tie directly into this study’s
focus on APT detection methods. Its clear goal is understanding how different groups might
interact with tech like public WiFi at Staples for example, given their unique concerns.
Social Implications
When stuff like this happens it’s usually marginalized communities hit the hardest. They don’t
have the same access to resources as everyone else, making them perfect targets for
cybercriminals. By focusing on them, we can start to understand and address these concerns
better.
Conclusion
We all want a secure digital space but traditional methods just aren’t going to cut it. With such
an inclusive approach in mind, this study takes important steps toward better cybersecurity
practices. By identifying trends and strategies in APT attacks, they’ve set future research up
with a good foundation that could bring us closer to our goal.
Work Cited
Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah, A
systematic literature review on advanced persistent threat behaviors and its
detection strategy, Journal of Cybersecurity, Volume 10, Issue 1, 2024,
tyad023, https://doi.org/10.1093/cybsec/tyad023