| Literature DB >> 35808159 |
Thulfiqar Jabar1, Manmeet Mahinderjit Singh1.
Abstract
During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and availability (CIA) of the information. One attack that occurs is Advanced Persistent Threat (APT). Attackers can manipulate a device's behavior, applications, and services. Such manipulations lead to signification of a deviation from a known behavioral baseline for smartphones. In this study, the authors present a Systematic Literature Review (SLR) to provide a survey of the existing literature on APT defense mechanisms, find research gaps, and recommend future directions. The scope of this SLR covers a detailed analysis of most cybersecurity defense mechanisms and cutting-edge solutions. In this research, 112 papers published from 2011 until 2022 were analyzed. This review has explored different approaches used in cybersecurity and their effectiveness in defending against APT attacks. In a conclusion, we recommended a Situational Awareness (SA) model known as Observe-Orient-Decide-Act (OODA) to provide a comprehensive solution to monitor the device's behavior for APT mitigation.Entities:
Keywords: Internet of Things (IoT); Observe–Orient–Decide–Act (OODA); Situational Awareness (SA); fingerprint; privacy; risk management; security; threat modeling; trust management; zero trust
Mesh:
Substances:
Year: 2022 PMID: 35808159 PMCID: PMC9269007 DOI: 10.3390/s22134662
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Differences between APTs and traditional malware attacks.
| Characteristics | Advanced Persistent Threats | Traditional Malware Attacks |
|---|---|---|
| Attack definition | APT is a highly sophisticated, well-organized, and well-targeted attack (e.g., Stuxnet). | The term “malware” refers to software intended to attack and disrupt digital systems (e.g., ransomware). |
| Attacker | Government actors and organized criminal groups | A cracker (a hacker in illegal activities). |
| Target | Targets a wide range of businesses and organizations, including diplomatic organizations, the information technology sector, and others. | Targets any personal or business device. |
| Purpose | The purpose of this attack is to damage a specified target or steal sensitive data. | The purpose of this attack is financial gain. |
| Attack life cycle | Maintain persistence as possible using different conceal tools. | The malware is eliminated when it is identified via security tools (e.g., anti-virus software). |
Figure 1FrozenCell attack life cycle based on MITRE framework.
Figure 2Common device behavior solutions life cycle.
Figure 3Behavior source classifications.
Figure 4ISRM processes.
Figure 5Zero trust resource access.
Situational awareness models developed to provide quantitative indicators in decision-making.
| Model | Focus |
|---|---|
| SAM (Situational Awareness Model) | Cognitive decision-making |
| OODA Loop (Observe–Orient–Decide–Act) | Cognitive decision-making |
| JDL DFM (JDL Data Fusion Model) | Processing and fusion of data and SA |
| CSAM (Cyber Situational Awareness Model) | Business continuity planning and CSA |
| SARM (Situational Awareness Reference Model) | Situational awareness |
| ECSA (Effective Cyber Situational Awareness) | CSA in computer networks |
PICOC criteria.
| Population | APT Attack Defense |
|---|---|
| Intervention | APT defense mechanisms |
| Comparison | Not available |
| Outcomes | Device behavior-based APT detection |
| Context | Review the existing studies of device behavior-based APT detection |
Figure 6PRISMA flowchart for relevant paper selection.
Mapping between the collected APT features and the ATT&CK-based taxonomy: from Initial Access to Impact stage.
| References | APT Features | ATT&CK |
|---|---|---|
| [ | Spear phishing | Initial access |
| [ | Watering hole | |
| [ | Malware | |
| [ | Application repackaging | |
| [ | Attacks on an Internet-facing server | |
| [ | Removable device | |
| [ | Drive-by download | |
| [ | Spoofing attack | |
| [ | SQL injection | Execution |
| [ | Zero day, known vulnerability | |
| [ | Remote code execution/Code injection | |
| [ | User to Root (U2R) | Persistence |
| [ | User to Root (U2R) | Privilege escalation |
| [ | Unauthorized access | Defense evasion |
| [ | Buffer overflow | |
| [ | Brute force | Credential access |
| [ | Pass hash | |
| [ | Man-in-the-middle | |
| [ | Password cracking | |
| [ | Eavesdropping | |
| [ | Social engineering | Discovery |
| [ | Probe | |
| [ | Lateral/Internal spear-phishing emails | Lateral movement |
| [ | Data leakage | Collection |
| Cloud data leakage. | ||
| [ | Removable device | C&C and Exfiltration |
| Tunneling over protocol | ||
| [ | DOS | Impact |
| [ | Botnet | |
| [ | Software update | |
| Data fabrication |
APT defense mechanisms.
| Technique Used | Component | Platform | APT Defense Mechanisms |
|---|---|---|---|
| Global abnormal forest (GAF) [ | Network | Mobile and computer | D |
| Mobile secure manager (MSM), analyzer (static and dynamic analysis) [ | Human behavior | Mobile | D |
| Federated learning algorithm [ | Application | Mobile | D |
| Naïve Bayes classifier [ | Application | IoT | D |
| Domain generation algorithm (DGA) [ | Network | IoT | D |
| Deep autoencoder [ | Network | IoT | D |
| Genetic programming, classification and regression trees, support vector machines, and dynamic Bayesian game model [ | Network | IoT | D |
| Maximum connected subgraph algorithm [ | Network | IoT | D |
| AutoEncoder and 1D CNN (1-Dimension Convolutional Neural Network) [ | Application | IoT | D |
| Prospect Theoretic Game [ | Network | IoT | D |
| Random forest (RF) [ | Network | Unmanned aerial vehicles (UAVs) | D |
| Outlier Dirichlet Mixture (ODM-ADS) mechanism [ | Network | Fog computing | D |
| Random forest (RF), support vector machine (SVM), and multi-layer perceptron (MLP) [ | Network | General | D |
| Multi-layer perceptron (MLP), convolutional neural network (CNN), and long short-term memory (LSTM) [ | Network | General | D |
| Cumulative prospect theory (CPT) [ | Network | General | D |
| Malicious IP address detection module (MIPD), malicious Secure Sockets Layer (SSL) certificate detection module (MSSLD), domain-flux detection module (DFD), and Tor connection detection module (TorD) [ | Network | General | D |
| Semantic event correlation [ | Device and Network | Computer | D |
| Dynamic programming algorithm [ | Device | Computer | D |
| Support vector machine (SVM) [ | Network | Computer | D |
| Signature-based and anomaly-based detection technology [ | Network | Computer | D |
| Threat detection (disguised executable file detection (DeFD), malicious file hash detection (MFHD), malicious domain name detection (MDND), malicious IP address detection (MIPD), malicious SSL certificate detection (MSSLD), domain flux detection (DFD), scan detection (SD), and Tor connection detection (TorCD)) | Network | Computer | D |
| Decision tree [ | Device | Computer | D |
| Memory-augmented deep auto-encoder (MemAE) [ | Network | Computer | D |
| Random forest classifier [ | Application | Computer | D |
| Vermiform window, scalable inference engine called SANSA, and ontology-based data abstraction [ | Device | Computer | D |
| Bayesian networks [ | Network | General | D |
| Random forest algorithms [ | Application | IoT | D |
| Random forest classifier [ | Application | Computer | D |
| Self-organizing feature maps [ | Application | Computer | D |
| Vectorized mobile ATT&CK matrix and the indicator pairing technique [ | Application | Mobile | D |
| Random forest (RF) [ | Network | IoT | D |
| Manhattan distance and metric distance algorithms [ | Application | Computer | D |
| Random forest and isolation forest [ | Application | Computer | D |
| Passive network monitoring, in-host auditing subsystem monitoring [ | Network and device | General | D |
| Federated learning algorithm, differentially private data perturbation mechanism [ | Network | IoT | D |
| Hierarchical clustering algorithm [ | Network | IoT | D |
| Reconnaissance deception system (RDS) [ | Network | Computer | M |
| Hidden Markov model (HMM) [ | Network | IoT | M |
| Pretense theory [ | Network | Cloud computing | M |
| Metagames and hypergames [ | Network | Computer | M |
| Data-centric security approach–Ciphertext Policy-Attribute-based Encryption(CP-ABER-LWE) scheme [ | Device | IoT | P |
| Analytic hierarchy process (AHP) and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) model, and the OpenFlow technique [ | Network | General | P |
| Lyapunov-based intelligence-driven security-aware defense mechanism [ | Network | Computer | P |
| Trusted Platform Module [ | Network | Computer | P |
| Cyber risk management (cyber-insurance) and game theory (dynamic Stackelberg game) [ | Network | Fog computing | I |
| Cyber risk management (cyber-insurance) and game theory (FlipIn game) [ | Network | IoT | I |
| Role- and attribute-based access control and multilevel security model [ | Device | Mobile | P |
| J48, Boyer-Moore algorithm, and k-NN (k Nearest Neighbor) algorithm [ | Network | Computer | D&R |
| Attack-defense trees (ADT) approach [ | Network | Computer | I |
| Bayesian network model [ | Network | Cloud computing | P |
| Strategic trust, game theory (signaling game and the FlipIt game) [ | Network | Computer | P |
| Multi-layer framework (iSTRICT) and associated equilibrium concept (GNE), and an adaptive algorithm [ | Network | IoT | P |
| Security information event management system (IBM Q-radar) [ | Network | General | I |
| Individual-level continuous-time dynamic model [ | Network | Computer | D |
| Zero-day attacks activity recognition method, malicious C&C DNS mining method (MCCDRM), and purpose-oriented situation-aware access control [ | Network | IoT | D |
| Adaboost classifier [ | Network | IIoT | D |
| AutoEncoder [ | Network | Computer | D |
| Bayesian classification algorithm and fuzzy analytical hierarchy process [ | Network | General | D |
| Bayesian Stackelberg game [ | Network | General | D |
| Hypergame theory [ | Network | General | M |
APT Defense mechanisms: D = Detection, P = protection, I = Identification, R = Response, M = Mitigation.
Risk management approaches.
| Approach | Platform | Attack Type |
|---|---|---|
| Opportunity-enabled risk management (OPPRIM) methodology [ | Mobile | Cyber-attack |
| Permission-based Hybrid Risk Management framework for Android apps (PHRiMA) [ | Mobile | privilege-induced attack |
| Bi-level game-theoretic framework [ | IoT | APT |
| Intelligent risk management framework [ | IoT | DDOS and SQL injections attacks |
| IoT security risk management strategy reference model (IoTSRM2) [ | IoT | Cyber-attack |
| IoT risk management model [ | IoT | Cyber-attack |
| IoT security risk model [ | IoT | Cyber-attack |
| Threat and risk management framework [ | IoT | Cyber-attack |
| Proactive CAV cyber-risk classification model [ | Connected and Autonomous Vehicle (CAV) | Cyber-attack |
| Cyber risk management (cyber-insurance) tool [ | Fog computing | APT |
| Cyber risk vulnerability management (CYRVM) platform [ | General | Cyber-attack |
| Bi-level mechanism [ | General | Cyber-attack |
| AMBIENT (Automated Cyber and Privacy Risk Management Toolkit) [ | General | Cyber-attack |
| Information security risk management situation aware ISRM (SA-ISRM) model [ | General | Cyber-attack |
| Risk and dynamic access control tool [ | General | Cyber-attack |
| Knowledge security risk management model [ | General | Cyber-attack |
| Information security risk management (ISRM) [ | General | Cyber-attack |
| Semi-Markov decision process framework [ | 5G edge-cloud ecosystem | (DoS) attack |
| Risk management framework [ | Cyber-physical systems | Cyber-attack |
| Integrated cyber-security risk management framework [ | Cyber-physical Systems | Cyber-attack |
| Security information event management system (IBM Q-radar) [ | General | APT |
| Cyber risk management (cyber-insurance) and dynamic Stackelberg game [ | Fog computing | APT |
| Viewnext-UEx model [ | Computer | Cyber-attack |
Figure 7ATT&CK-based taxonomy of APT features.
Figure 8APT defense approaches.
Figure 9Risk management approaches.
Figure 10ZooPark attack versions.
Figure 11OODA loop.
Figure 12Conceptual framework of mobile device behavior fingerprint for APT mitigation.