Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/258788
Title: Targeted cyber attacks and their mitigation techniques
Researcher: Sibi Chakkaravarthy S
Guide(s): Vaidehi V
Keywords: Engineering and Technology,Computer Science,Computer Science Information Systems
Targeted Cyber Attacks
Their Mitigation
University: Anna University
Completed Date: 2018
Abstract: Targeted Cyber Attacks (TCA) and Advanced Persistent Threats (APT) are the main reason for most of the Cyber espionages and sabotages. TCAs and APTs are highly sophisticated, target specific and operate in a stealthy mode till the target is compromised and are difficult to be identified by traditional security systems. The intention of the above-mentioned attacks is to deploy target specific automated malwares in a host or network. Traditional security systems like antivirus, anti-malware system which depend on signatures and static analysis fail to identify such attacks. Hence there is a need for efficient solutions to detect TCAs and APT. In this newlinedissertation, three novel methods have been proposed to detect such attacks. The first method deals with detecting APTs whereas the second method deals with Intrusion Detection Honeypot (IDH) for detecting and mitigating targeted ransomware attacks. Finally, a novel Wireless Intrusion Detection System (WIDS) has been proposed to detect targeted attacks using drones. Advanced Persistent Threats (APT) are major threats in the field of system and network security. Advanced evasion techniques like packing, encryption and behavior obfuscation are employed in APTs to hide their malicious behavior and evade the existing detection techniques. Behaviour obfuscation techniques mainly hide the behaviour of the malware by inserting fake system calls, unrelated API call trees etc. This scrambles the behavior of the malware and makes it impossible for the classifier to trace it and identify whether it is malicious or not. This leads traditional security systems like AVs, sandboxes to fail in detecting APTs. Hence to overcome the above stated problem, a novel hybrid analysis technique using Behavior based Sandboxing (BbS) approach is proposed. newline newline newline
Pagination: xxviii, 185p.
URI: http://hdl.handle.net/10603/258788
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File24.68 kBAdobe PDFView/Open
02_certificates.pdf375.86 kBAdobe PDFView/Open
03_abstract.pdf29.88 kBAdobe PDFView/Open
04_acknowledgement.pdf96.66 kBAdobe PDFView/Open
05_table of contents.pdf157.6 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf16.23 kBAdobe PDFView/Open
07_chapter1.pdf33.89 kBAdobe PDFView/Open
08_chapter2.pdf262.54 kBAdobe PDFView/Open
09_chapter3.pdf9.91 kBAdobe PDFView/Open
10_chapter4.pdf249.23 kBAdobe PDFView/Open
11_chapter5.pdf343.69 kBAdobe PDFView/Open
12_chapter6.pdf370.47 kBAdobe PDFView/Open
13_chapter7.pdf523.91 kBAdobe PDFView/Open
14_conclusion.pdf10.25 kBAdobe PDFView/Open
15_references.pdf44.77 kBAdobe PDFView/Open
16_list_of_publications.pdf6.89 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: