All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Proposed Approach for Targeted Attacks Detection

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F16%3A00087688" target="_blank" >RIV/00216224:14330/16:00087688 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/chapter/10.1007%2F978-3-319-24584-3_7" target="_blank" >http://link.springer.com/chapter/10.1007%2F978-3-319-24584-3_7</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-319-24584-3_7" target="_blank" >10.1007/978-3-319-24584-3_7</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Proposed Approach for Targeted Attacks Detection

  • Original language description

    For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise Internet infrastructure. Targeted attack or advanced persistent threat (APT) attack is a new challenge and aims to accomplish a specific goal, most often espionage. APTs are presently the biggest threat to governments and organizations. This paper states research questions and propose a novel approach to intrusion detection system processes network traffic and able to detect potential APT attack. This detection of APT attack is based on the correlation between the events which we get as outputs of our detection methods. Each detection method aims to detect one technique used in one of APT attack steps.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/OFMASUN201301" target="_blank" >OFMASUN201301: CIRC - Mobile dedicated devices to fulfilling ability to respond to cyber incidents</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering

  • ISBN

    9783319245829

  • ISSN

    1876-1100

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    73-80

  • Publisher name

    Springer International Publishing

  • Place of publication

    Phuket

  • Event location

    Phuket

  • Event date

    Jan 1, 2016

  • Type of event by nationality

    CST - Celostátní akce

  • UT code for WoS article