Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/258788
Title: | Targeted cyber attacks and their mitigation techniques |
Researcher: | Sibi Chakkaravarthy S |
Guide(s): | Vaidehi V |
Keywords: | Engineering and Technology,Computer Science,Computer Science Information Systems Targeted Cyber Attacks Their Mitigation |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | Targeted Cyber Attacks (TCA) and Advanced Persistent Threats (APT) are the main reason for most of the Cyber espionages and sabotages. TCAs and APTs are highly sophisticated, target specific and operate in a stealthy mode till the target is compromised and are difficult to be identified by traditional security systems. The intention of the above-mentioned attacks is to deploy target specific automated malwares in a host or network. Traditional security systems like antivirus, anti-malware system which depend on signatures and static analysis fail to identify such attacks. Hence there is a need for efficient solutions to detect TCAs and APT. In this newlinedissertation, three novel methods have been proposed to detect such attacks. The first method deals with detecting APTs whereas the second method deals with Intrusion Detection Honeypot (IDH) for detecting and mitigating targeted ransomware attacks. Finally, a novel Wireless Intrusion Detection System (WIDS) has been proposed to detect targeted attacks using drones. Advanced Persistent Threats (APT) are major threats in the field of system and network security. Advanced evasion techniques like packing, encryption and behavior obfuscation are employed in APTs to hide their malicious behavior and evade the existing detection techniques. Behaviour obfuscation techniques mainly hide the behaviour of the malware by inserting fake system calls, unrelated API call trees etc. This scrambles the behavior of the malware and makes it impossible for the classifier to trace it and identify whether it is malicious or not. This leads traditional security systems like AVs, sandboxes to fail in detecting APTs. Hence to overcome the above stated problem, a novel hybrid analysis technique using Behavior based Sandboxing (BbS) approach is proposed. newline newline newline |
Pagination: | xxviii, 185p. |
URI: | http://hdl.handle.net/10603/258788 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 24.68 kB | Adobe PDF | View/Open |
02_certificates.pdf | 375.86 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 29.88 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 96.66 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 157.6 kB | Adobe PDF | View/Open | |
06_list_of_symbols and abbreviations.pdf | 16.23 kB | Adobe PDF | View/Open | |
07_chapter1.pdf | 33.89 kB | Adobe PDF | View/Open | |
08_chapter2.pdf | 262.54 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 9.91 kB | Adobe PDF | View/Open | |
10_chapter4.pdf | 249.23 kB | Adobe PDF | View/Open | |
11_chapter5.pdf | 343.69 kB | Adobe PDF | View/Open | |
12_chapter6.pdf | 370.47 kB | Adobe PDF | View/Open | |
13_chapter7.pdf | 523.91 kB | Adobe PDF | View/Open | |
14_conclusion.pdf | 10.25 kB | Adobe PDF | View/Open | |
15_references.pdf | 44.77 kB | Adobe PDF | View/Open | |
16_list_of_publications.pdf | 6.89 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: