Netinfo Security ›› 2016, Vol. 16 ›› Issue (9): 118-123.doi: 10.3969/j.issn.1671-1122.2016.09.024

• Orginal Article • Previous Articles     Next Articles

Analysis of APT Attack Principle and Protection Technology

Sanjun CHENG(), Yu WANG   

  1. People's Procuratorate of Henan Province, Zhengzhou Henan 450004, China
  • Received:2016-07-25 Online:2016-09-20 Published:2020-05-13

Abstract:

The continuous evolution of the global information technology makes the APT attacks more aggressive and purposeful. Application of advanced technology, long latency hidden and sponsored by profit party long-term funding, is significantly different APT attacks from other network attacks. This paper introduces the popular APT attacks in recent years, such as NIST attacks on the APT, so as to give the character of APT attacks, and indicate usual target of APT attack, by analysising APT attack case in recent years. After a detailed analysis of the common steps of APT attacks-South Korea SK company being APT attack, it illustrates the various steps of the offensive content. Furthermore, it puts forward comprehensive response to the APT attacks from the macroscopic continuous improvement of protection concept and micro structured best practice methods solutions.

Key words: APT, case analysis, defensive thinking

CLC Number: