scispace - formally typeset
Journal ArticleDOI

Advanced Persistent threats and how to monitor and deter them

Colin Tankard
- 01 Aug 2011 - 
- Vol. 2011, Iss: 8, pp 16-19
TLDR
Traditional defences aimed at keeping known threats out of the network are no longer sufficient against the exploits being used to conduct such attacks and the focus should be on developing a defence in depth strategy that aims to constantly monitor networks and security controls for their effectiveness, explains Colin Tankard of Digital Pathways.
About
This article is published in Network Security.The article was published on 2011-08-01. It has received 346 citations till now. The article focuses on the topics: Advanced persistent threat & Cybercrime.

read more

Citations
More filters
Journal ArticleDOI

Software-Defined Networking: A Comprehensive Survey

TL;DR: This paper presents an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications, and presents the key building blocks of an SDN infrastructure using a bottom-up, layered approach.
Posted Content

Software-Defined Networking: A Comprehensive Survey

TL;DR: Software-Defined Networking (SDN) as discussed by the authors is an emerging paradigm that promises to change this state of affairs, by breaking vertical integration, separating the network's control logic from the underlying routers and switches, promoting (logical) centralization of network control, and introducing the ability to program the network.
Journal ArticleDOI

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset

TL;DR: In this paper, the authors proposed a new dataset, called Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks, and evaluated the reliability of the dataset using different statistical and machine learning methods for forensics purposes.
Proceedings ArticleDOI

Towards secure and dependable software-defined networks

TL;DR: This paper describes several threat vectors that may enable the exploit of SDN vulnerabilities and sketches the design of a secure and dependable SDN control platform as a materialization of the concept here advocated.
Journal ArticleDOI

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

TL;DR: This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services, and to comprehensively understand the threats and attacks on IoT infrastructure.