{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:49:39Z","timestamp":1743130179663,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030239459"},{"type":"electronic","value":"9783030239466"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-23946-6_16","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T02:03:58Z","timestamp":1561428238000},"page":"141-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Proposed Models for Advanced Persistent Threat Detection: A Review"],"prefix":"10.1007","author":[{"given":"Santiago","family":"Quintero-Bonilla","sequence":"first","affiliation":[]},{"given":"Angel Mart\u00edn","family":"del Rey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR2","unstructured":"Check Point Research: Global Cyber Attack Trends Report. Technical report (2017)"},{"key":"16_CR3","unstructured":"Cherepanov, A.: WIN32\/INDUSTROYER: A new threat for industrial control systems. Technical report (2017)"},{"key":"16_CR4","unstructured":"Cisco Systems, Inc.: Midyear Cybersecurity Report. Technical report (2017)"},{"issue":"6","key":"16_CR5","first-page":"29","volume":"5","author":"N Falliere","year":"2011","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White Pap. Symantec Corp., Secur. Response 5(6), 29 (2011)","journal-title":"White Pap. Symantec Corp., Secur. Response"},{"key":"16_CR6","unstructured":"Ford, V., Siraj, A.: Applications of machine learning in cyber security. In: Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering (2014)"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2018.06.055","volume":"89","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., Hammoudeh, M., Prenosil, V., Han, L., Hegarty, R., Rabie, K., Aparicio-Navarro, F.J.: Detection of advanced persistent threat using machine-learning correlation analysis. Futur. Gener. Comput. Syst. 89, 349\u2013359 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Giura, P., Wang, W.: A context-based detection framework for advanced persistent threats. In: Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, SocialInformatics, pp. 69\u201374 (2012)","DOI":"10.1109\/CyberSecurity.2012.16"},{"issue":"5","key":"16_CR9","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"16_CR10","unstructured":"Kasperky Lab: The Duqu 2.0 - Technical Details (V2.1). Technical report June (2015)"},{"key":"16_CR11","first-page":"113","volume":"22","author":"K Krombholz","year":"2015","unstructured":"Krombholz, K., Hobel, H., Huber, M., Weippl, E.: Advanced social engineering attacks. J. Inf. Secur. Appl. 22, 113\u2013122 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"16_CR12","unstructured":"Mandiant: APT1 Exposing One of China\u2019s Cyber Espionage Units. Technical report (2013)"},{"key":"16_CR13","unstructured":"Mandiant: M-Trends 2017: A view from the front lines. Technical report (2017)"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.cose.2018.03.001","volume":"76","author":"J Navarro","year":"2018","unstructured":"Navarro, J., Deruyver, A., Parrend, P.: A systematic survey on multi-step attack detection. Comput. Secur. 76, 214\u2013249 (2018)","journal-title":"Comput. Secur."},{"key":"16_CR15","unstructured":"NIST: Managing information security risk: Organization, mission, and information system view. Special Publication 800-839 (2011)"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s10586-016-0716-0","volume":"20","author":"PK Sharma","year":"2017","unstructured":"Sharma, P.K., Moon, S.Y., Moon, D., Park, J.H.: DFA-AD: a distributed framework architecture for the detection of advanced persistent threats. Cluster Comput. 20(1), 597\u2013609 (2017)","journal-title":"Cluster Comput."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Shenwen, L., Yingbo, L., Xiongjie, D.: Study and research of apt detection technology based on big data processing architecture. In: 5th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 313\u2013316. IEEE (2015)","DOI":"10.1109\/ICEIEC.2015.7284547"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Shenwen, L., Yingbo, L., Xiongjie, D.: Study and research of apt detection technology based on big data processing architecture. In: 2015 5th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 313\u2013316. IEEE (2015)","DOI":"10.1109\/ICEIEC.2015.7284547"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Siddiqui, S., Khan, M.S., Ferens, K., Kinsner, W.: Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics - IWSPA 2016, pp. 64\u201369. ACM Press (2016)","DOI":"10.1145\/2875475.2875484"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Su, Y., Li, M., Tang, C., Shen, R.: A framework of apt detection based on dynamic analysis. In: 2015 4th National Conference on Electrical, Electronics and Computer Engineering. Atlantis Press (2015)","DOI":"10.2991\/nceece-15.2016.187"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Ussath, M., Jaeger, D., Cheng, F., Meinel, C.: Advanced persistent threats: behind the scenes. In: Annual Conference on Information Science and Systems (CISS), pp. 181\u2013186. IEEE (2016)","DOI":"10.1109\/CISS.2016.7460498"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H., Wang, C.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","Distributed Computing and Artificial Intelligence, 16th International Conference, Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23946-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T15:05:33Z","timestamp":1729177533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23946-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030239459","9783030239466"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23946-6_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u00c1vila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}