Home   Research Publications Members Related Software
IndexBrowse   BibliographiesMy selection
 Search: in   (word length ≥ 3)
      Login
Publication no #552   Download bibtex file Type :   Html | Bib | Both
Add to my selection
An Advanced Persistent Threat Exemplar

Ryan Wagner, Matthew Fredrikson and David Garlan.


Technical report, CMU-ISR-17-100, Institute of Software Research, Carnegie Mellon University, July 2017. http://reports-archive.adm.cs.cmu.edu/anon/isr2017/abstracts/17-100.html.

Online links: PDF

Abstract
Security researchers do not have sufficient example systems for conducting research on advanced persistent threats, and companies and agencies that experience attacks in the wild are reluctant to release detailed information that can be examined. In this paper, we describe an Advanced Persistent Threat Exemplar that is intended to provide a real-world attack scenario with sufficient complexity for reasoning about defensive system adaptation, while not containing so much information as to be too complex. It draws from actual published attacks and experiences as a security engineer by the authors.

Keywords: Science of Security.  
@TechReport{Wagner:APT:2017,
      AUTHOR = {Wagner, Ryan and Fredrikson, Matthew and Garlan, David},
      TITLE = {An Advanced Persistent Threat Exemplar},
      YEAR = {2017},
      MONTH = {July},
      NUMBER = {CMU-ISR-17-100},
      INSTITUTION = {Institute of Software Research, Carnegie Mellon University},
      PDF = {http://acme.able.cs.cmu.edu/pubs/uploads/pdf/CMU-ISR-17-100.pdf},
      ABSTRACT = {Security researchers do not have sufficient example systems for conducting research on advanced persistent threats, and companies and agencies that experience attacks in the wild are reluctant to release detailed information that can be examined. In this paper, we describe an Advanced Persistent Threat Exemplar that is intended to provide a real-world attack scenario with sufficient complexity for reasoning about defensive system adaptation, while not containing so much information as to be too complex. It draws from actual published attacks and experiences as a security engineer by the authors.},
      NOTE = {http://reports-archive.adm.cs.cmu.edu/anon/isr2017/abstracts/17-100.html},
      KEYWORDS = {Science of Security}
}
    Created: 2017-09-27 14:54:03     Modified: 2017-12-04 15:04:20
Feedback: ABLE Webmaster
Last modified: Sat October 12 2019 16:15:32
        BibAdmin