SlideShare a Scribd company logo
12
Most read
17
Most read
19
Most read
Presented by:
QuratulAin Najeeb
. • Advance persistent threat
. • Stages of APT
. • Problem in Detection
. • Events
. • Detection Framework
Advanced
Use of advanced techniques
Persistent
Remain in system for long period
“Low” and “Slow”
Threat
Agenda of stealing data
A
P
T
Elements of APT
Don't destroy systems
Don't interrupt normal operation
Try to stay hidden and keep the stolen data flowing
Trick a user into installing malware
Spear-Phishing
6. Exfiltration
5. Data Collection
4.Operation
3. Exploitation
2. Delivery
1. Reconnaissance
Collecting information about
Organization’s resources
Spear phishing emails are prepared and sent
Command and control connection is build from
targeted employee’s machine via remote access
Persistent presence in network and gain access to
data
Information is packed, compressed and
encrypted
Data is moved over channels to various
external servers
Advanced persistent threat (apt)
Twitter 
Starbucks
LinkedIn
Sniffing
Captured:
Email address (engineer@gmail.com)
Friend’s email (engineer2@gmail.com)
Interests (www.ITECH-2013.com)
Hey look! An email from Engineer2. With a
catalog attached!
Spoofed, of
course Most
certainly
clicking
here
CLICK HERE TO VIEW “ITECH” EVENT 2013
The PDF gets clicked.
Code gets dropped.
The backdoor is opened.
The attacker connects to the listening
port i.e. Remote Access
At this point, the attacker
could do any number of
things to get more
sensitive data
Advanced persistent threat (apt)
A mean to detect potential
vulnerable elements towards the
targeted data
Attack tree of APT aimed at source data
AND
Problem
An attack path may go across multiple planes
PLANES EVENTS
Physical Physical devices, working
location
User Recording sensitive data
access
Network Firewall /logs/ IDS/IPS
Application Information deliver through
gateway
Candidate Events
Suspicious Events
Attack Events
Attack Pyramid Unfolded Attack Pyramid
Alert System
Using Algorithms
G={G1,…..Gn}
Gi = {P1, . . . , Pn}
Pi = {e1 ………….eK }
Put together the events relevant to an attack
context
Detection Rule
Signature based rules (Connecting to blacklisted domain)
Anomaly detection rules (Send more data than usual)
Policy based rules (Overloaded VPN connection)
In research papers APT is defined, and proposed
an attack model for problem detection i.e.
Attack Pyramid
http://www.research.att.com/techdocs/TD_101075.pdf
http://www.infosecurityproject.com/2012/Download/K7_Advanced%20Persist
ent%20Threat%20and%20Modern%20Malware_Jones%20Leung.pdf

More Related Content

PPT
Ch04 Network Vulnerabilities and Attacks
PDF
Anatomy of a cyber attack
PPT
Cyber Security Emerging Threats
PPTX
Different types of attacks in internet
PPTX
Types of Cyber Attacks
PPTX
NETWORK PENETRATION TESTING
PDF
Advanced persistent threats(APT)
PDF
Types of Threat Actors and Attack Vectors
Ch04 Network Vulnerabilities and Attacks
Anatomy of a cyber attack
Cyber Security Emerging Threats
Different types of attacks in internet
Types of Cyber Attacks
NETWORK PENETRATION TESTING
Advanced persistent threats(APT)
Types of Threat Actors and Attack Vectors

What's hot (20)

PDF
Threat Intelligence
PDF
Global Cyber Threat Intelligence
PDF
Cyber Threat Intelligence
PDF
Cyber Threat Intelligence
PPTX
IP Security
PDF
MITRE ATT&CK Framework
PPTX
Zero Trust Framework for Network Security​
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
Zero Trust Model Presentation
PDF
Cybersecurity Roadmap Development for Executives
PPTX
OWASP Top 10 2021 What's New
PPTX
Intrusion detection system
PPSX
Next-Gen security operation center
PDF
Addressing the cyber kill chain
PPTX
Security operation center (SOC)
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber kill chain
Threat Intelligence
Global Cyber Threat Intelligence
Cyber Threat Intelligence
Cyber Threat Intelligence
IP Security
MITRE ATT&CK Framework
Zero Trust Framework for Network Security​
Intrusion Detection Systems and Intrusion Prevention Systems
Zero Trust Model Presentation
Cybersecurity Roadmap Development for Executives
OWASP Top 10 2021 What's New
Intrusion detection system
Next-Gen security operation center
Addressing the cyber kill chain
Security operation center (SOC)
Advanced Persistent Threats (APTs) - Information Security Management
Network security (vulnerabilities, threats, and attacks)
Cyber kill chain
Ad

Similar to Advanced persistent threat (apt) (20)

PDF
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
PPTX
Understanding-and-Defending-Against-Advanced-Persistent-Threats-APT.pptx.pptx
PDF
Advanced Persistent Threats: How They Sneak In and Stay Hidden
PDF
2015-advanced-persistent-threat-awareness_whp_eng_1015
PDF
Apt zero day malware
PPTX
Break the chain - 7 phases of Advanced Persistent Threats
PPTX
Understanding advanced persistent threats (APT)
PDF
Cyber security series advanced persistent threats
PDF
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
PDF
Understanding Advanced Cybersecurity Threats for the In-House Counsel
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PDF
Awareness seminar on Advanced Persistent Threats
PDF
RSA: Security Analytics Architecture for APT
PDF
HCA 530, Week 2, Advanced persistent threat healthcare under attack
PPTX
APT in the Financial Sector
PPTX
Amien Harisen - APT1 Attack
PPTX
Persistence is Key: Advanced Persistent Threats
PDF
Intelligent Network Surveillance Technology for APT Attack Detections
PDF
Advanced Persistent Threats Cutting Through The Hype
PDF
Detecting Unknown Attacks Using Big Data Analysis
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
Understanding-and-Defending-Against-Advanced-Persistent-Threats-APT.pptx.pptx
Advanced Persistent Threats: How They Sneak In and Stay Hidden
2015-advanced-persistent-threat-awareness_whp_eng_1015
Apt zero day malware
Break the chain - 7 phases of Advanced Persistent Threats
Understanding advanced persistent threats (APT)
Cyber security series advanced persistent threats
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House Counsel
Cyber-Espionage: Understanding the Advanced Threat Landscape
Awareness seminar on Advanced Persistent Threats
RSA: Security Analytics Architecture for APT
HCA 530, Week 2, Advanced persistent threat healthcare under attack
APT in the Financial Sector
Amien Harisen - APT1 Attack
Persistence is Key: Advanced Persistent Threats
Intelligent Network Surveillance Technology for APT Attack Detections
Advanced Persistent Threats Cutting Through The Hype
Detecting Unknown Attacks Using Big Data Analysis
Ad

More from mmubashirkhan (11)

PPTX
Two factor authentication presentation mcit
PPTX
Situational awareness for computer network security
PPTX
Security threats and countermeasure in 3 g network
PPTX
Comparison between traditional vpn and mpls vpn
PPT
Security in wireless la ns
PPTX
Saa s multitenant database architecture
PPTX
Improving intrusion detection system by honeypot
PPTX
Drive by downloads-cns
PPTX
Cyber security issues
PPTX
Biometric security tech
PPTX
Authentication in manet
Two factor authentication presentation mcit
Situational awareness for computer network security
Security threats and countermeasure in 3 g network
Comparison between traditional vpn and mpls vpn
Security in wireless la ns
Saa s multitenant database architecture
Improving intrusion detection system by honeypot
Drive by downloads-cns
Cyber security issues
Biometric security tech
Authentication in manet

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Business Ethics Teaching Materials for college
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Basic Mud Logging Guide for educational purpose
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Week 4 Term 3 Study Techniques revisited.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Business Ethics Teaching Materials for college
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPH.pptx obstetrics and gynecology in nursing
102 student loan defaulters named and shamed – Is someone you know on the list?
Anesthesia in Laparoscopic Surgery in India
Basic Mud Logging Guide for educational purpose
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025

Advanced persistent threat (apt)