Reference Hub7
Improved Methodology to Detect Advanced Persistent Threat Attacks

Improved Methodology to Detect Advanced Persistent Threat Attacks

Ambika N.
Copyright: © 2020 |Pages: 19
ISBN13: 9781799822530|ISBN10: 1799822532|ISBN13 Softcover: 9781799822547|EISBN13: 9781799822554
DOI: 10.4018/978-1-7998-2253-0.ch009
Cite Chapter Cite Chapter

MLA

Ambika N. "Improved Methodology to Detect Advanced Persistent Threat Attacks." Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, IGI Global, 2020, pp. 184-202. https://doi.org/10.4018/978-1-7998-2253-0.ch009

APA

Ambika N. (2020). Improved Methodology to Detect Advanced Persistent Threat Attacks. In N. Chaubey & B. Prajapati (Eds.), Quantum Cryptography and the Future of Cyber Security (pp. 184-202). IGI Global. https://doi.org/10.4018/978-1-7998-2253-0.ch009

Chicago

Ambika N. "Improved Methodology to Detect Advanced Persistent Threat Attacks." In Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, 184-202. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2253-0.ch009

Export Reference

Mendeley
Favorite

Abstract

Cybersecurity is essentials in today's era. An increase in cyberattacks has driven caution to safeguard data. An advanced persistent attack is an attack where the intellectual property of an organization is attempted to be misused. The attacker stays on the network for a long-time intruding into confidential files. The attacker switches into sleep mode, masking himself. Hence, the attacker is quite difficult to trace. The proposed work is suggested to tackle the problem. Public key cryptography is used to encrypt the data. The hash code is affixed to the transmitted message to provide reliability to the transmitted data. The work proves to be 4.9% stronger in authenticating the received packets, provides 4.42% greater data reliability, and decreases the load of the server by 43.5% compared to work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.