Abstract
We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kanaoka, A., Katoh, M., Toudou, N., Okamoto, E.: Extraction of parameters from well managed networked system in access control. In: Proceedings of the ICIMP, Venice/Mestre, pp. 56–61 (2009)
The MITRE Corporation: Malware attribute enumeration and characterization. http://maec.mitre.org (2011)
Information-technology Promotion Agency Japan: Design and operational guide to protect against “Advanced Persistent Threats”, revised 2nd edn. http://www.ipa.go.jp/security/vuln/documents/eg_newattack.pdf (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kato, M., Matsunami, T., Kanaoka, A., Koide, H., Okamoto, E. (2013). Tracing Advanced Persistent Threats in Networked Systems. In: Al-Shaer, E., Ou, X., Xie, G. (eds) Automated Security Management. Springer, Cham. https://doi.org/10.1007/978-3-319-01433-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-01433-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01432-6
Online ISBN: 978-3-319-01433-3
eBook Packages: Computer ScienceComputer Science (R0)