Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Targeted cyberattacks: a superset of advanced persistent threats
Sood A., Enbody R. IEEE Security and Privacy11 (1):54-61,2013.Type:Article
Date Reviewed: May 16 2014

Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for practitioners designing secure systems.

The paper presents an overview of targeted attacks. It includes a very thorough section on threat models, which describes many ways that hackers use targeted attacks to obtain their objectives. The material in this section helps us understand how these attacks happen. This is followed by a section on frameworks and other tools used by hackers to perform their exploits. In addition, there is a section on how users can prevent these attacks. However, the possibility of building better software that can withstand or mitigate these attacks is not mentioned.

The authors confuse vulnerabilities with attacks; for example, cross-site scripting (XSS) and SQL injection (SQLI) are types of attacks, not vulnerabilities as described in the section on intelligence gathering. A vulnerability is a weak point that allows an attack to occur. While the writing is clear, the reader should have knowledge of concepts such as URL obfuscation, Whois lookups, and so on; they are not explained, although specific references to them are given.

Reviewer:  E. B. Fernandez Review #: CR142288 (1408-0657)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Invasive Software (D.4.6 ... )
 
 
Security (K.4.4 ... )
 
 
Electronic Commerce (K.4.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy