Discovering Suspicious APT Families Through a Large-Scale Domain Graph in Information-Centric IoT

In recent years, a type of cyberattacks, known as advanced persistent threats, has resulted in very serious losses to various organizations such as governments and enterprises. The APT has the characteristics of long duration, complex attack means, and strong ability to conceal themselves, which mak...

Full description

Bibliographic Details
Main Authors: Zhen Ma, Qiang Li, Xiangyu Meng
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
APT
Online Access:https://ieeexplore.ieee.org/document/8624251/