论文部分内容阅读
高级持久性威胁(APT)的发起者利用多种让人出乎预料、有时间期限且多重的攻击向量来攻击国家、行业、特定组织和个人。他们试图获得长期访问并控制您的IT基础架构,以达到自己的政治、犯罪和经济目的。这些是复杂并且有针对性的攻击威胁,不光所利用的技术和方法如此,而且从长期以来人们为了控制APT所做的巨大努力中也能领会其危险性可见一斑。ATP的初始攻击向量易于修改而且动态多变,因
The sponsors of Advanced Persistence Threat (APT) attack countries, industries, specific organizations and individuals with a variety of unexpected, time-bound and multiple attack vectors. They try to gain long-term access and control over your IT infrastructure for their political, criminal and economic purposes. These are complex and targeted threats of attack, not only by the technologies and methods employed, but also by the longstanding potential of people’s efforts to control APT. The initial attack vector of ATP is easy to modify and dynamic