Proceedings of the 2nd International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2014)

Research on Prevention Solution of Advanced Persistent Threat

Authors
Xiaomei Liu
Corresponding Author
Xiaomei Liu
Available Online March 2014.
DOI
10.2991/sekeie-14.2014.33How to use a DOI?
Keywords
APT attacks; malicious website; IDS; traffic analysis; anomaly detection
Abstract

This paper analyzes the process of Google Aurora attack, summarizes the typical steps of APT attacks. By analyzing the defects on traditional enterprise security architecture, this paper proposes a new security solution with a central analysis and control module. The module adopts a detection mode based on the storage, and it is divided into storage layer, analysis layer and presentation layer.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2014)
Series
Advances in Intelligent Systems Research
Publication Date
March 2014
ISBN
10.2991/sekeie-14.2014.33
ISSN
1951-6851
DOI
10.2991/sekeie-14.2014.33How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xiaomei Liu
PY  - 2014/03
DA  - 2014/03
TI  - Research on Prevention Solution of Advanced Persistent Threat
BT  - Proceedings of the 2nd International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2014)
PB  - Atlantis Press
SP  - 139
EP  - 142
SN  - 1951-6851
UR  - https://doi.org/10.2991/sekeie-14.2014.33
DO  - 10.2991/sekeie-14.2014.33
ID  - Liu2014/03
ER  -