Tracing advanced persistent threats in networked systems

Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Abstract

We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

Original languageEnglish
Title of host publicationAutomated Security Management
PublisherSpringer International Publishing
Pages179-187
Number of pages9
ISBN (Electronic)9783319014333
ISBN (Print)9783319014326
DOIs
Publication statusPublished - Jan 1 2013

Fingerprint

Information systems
Planning

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Kato, M., Matsunami, T., Kanaoka, A., Koide, H., & Okamoto, E. (2013). Tracing advanced persistent threats in networked systems. In Automated Security Management (pp. 179-187). Springer International Publishing. https://doi.org/10.1007/978-3-319-01433-3_11

Tracing advanced persistent threats in networked systems. / Kato, Masahiko; Matsunami, Takumi; Kanaoka, Akira; Koide, Hiroshi; Okamoto, Eiji.

Automated Security Management. Springer International Publishing, 2013. p. 179-187.

Research output: Chapter in Book/Report/Conference proceedingChapter

Kato, M, Matsunami, T, Kanaoka, A, Koide, H & Okamoto, E 2013, Tracing advanced persistent threats in networked systems. in Automated Security Management. Springer International Publishing, pp. 179-187. https://doi.org/10.1007/978-3-319-01433-3_11
Kato M, Matsunami T, Kanaoka A, Koide H, Okamoto E. Tracing advanced persistent threats in networked systems. In Automated Security Management. Springer International Publishing. 2013. p. 179-187 https://doi.org/10.1007/978-3-319-01433-3_11
Kato, Masahiko ; Matsunami, Takumi ; Kanaoka, Akira ; Koide, Hiroshi ; Okamoto, Eiji. / Tracing advanced persistent threats in networked systems. Automated Security Management. Springer International Publishing, 2013. pp. 179-187
@inbook{1e260bd22e524d45a7f9f2c912aa993c,
title = "Tracing advanced persistent threats in networked systems",
abstract = "We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.",
author = "Masahiko Kato and Takumi Matsunami and Akira Kanaoka and Hiroshi Koide and Eiji Okamoto",
year = "2013",
month = "1",
day = "1",
doi = "10.1007/978-3-319-01433-3_11",
language = "English",
isbn = "9783319014326",
pages = "179--187",
booktitle = "Automated Security Management",
publisher = "Springer International Publishing",

}

TY - CHAP

T1 - Tracing advanced persistent threats in networked systems

AU - Kato, Masahiko

AU - Matsunami, Takumi

AU - Kanaoka, Akira

AU - Koide, Hiroshi

AU - Okamoto, Eiji

PY - 2013/1/1

Y1 - 2013/1/1

N2 - We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

AB - We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

UR - http://www.scopus.com/inward/record.url?scp=84926147163&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84926147163&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-01433-3_11

DO - 10.1007/978-3-319-01433-3_11

M3 - Chapter

AN - SCOPUS:84926147163

SN - 9783319014326

SP - 179

EP - 187

BT - Automated Security Management

PB - Springer International Publishing

ER -