A SURVEY REPORT ON ADVANCED PERSISTENT THREAT
Keywords:
APT, Malware, TTP, SIEM, C&CAbstract
he Advanced Persistent Threat (APT) has become the countersign for today’s cyber espionage. It is
continuously involves a piece of malware programs that can conceal detection, remain in target systems for the long
periods of time and reach out across the Internet to exfiltration data or allow an attacker to exert further control of the
system. Using APTs attacks economic losses are increasing very widely about billion to hundreds of billions of dollars
per year. There are different defensive tools, procedures and other controls commonly put in place to handle produce
security threats are often inadequate against targeted APT-style attacks because the actors behind the intrusion are
focused on a specific target and are able to customize and alter their Tactics, Techniques and Procedures (TTP) to
predict and evade security controls and standard incident response practices. In this paper we have focus on process of
working about APTs and related case studies about the attack and according to that give related solution against same.