Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Critical Analysis on Advanced Persistent Threats

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Murtaza A. Siddiqi, Naveed Ghani

Murtaza A Siddiqi and Naveed Ghani. Critical Analysis on Advanced Persistent Threats. International Journal of Computer Applications 141(13):46-50, May 2016. BibTeX

	author = {Murtaza A. Siddiqi and Naveed Ghani},
	title = {Critical Analysis on Advanced Persistent Threats},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {141},
	number = {13},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {46-50},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2016909784},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Since the birth of Internet, cyber securities have always been an area full of unsolved problems for researchers. Particularly in the age of information, every corporate and government site needs to keep their sensitive data secure from hackers or intruders. With rapid advancement in improved security measures, there always comes along a threat which forces researchers to be on alert. In recent times “Advanced Persistent Threat” (APT) has been among the most highlighted threat for security experts. At early stages such attacks were dedicated to government or financial organizations, but recent studies based on security breaches indicate that such attacks are now carried out on a much wider domain. In this paper crucial attack stages with the most common methods and tools use by intruders to initiate APTs are discussed, along with recommendation on how a model can be defined to perceive an APT attack being conducted on a network.


  1. Revealed: Operation Shady RAT By Dmitri Alperovitch, Vice President, and Threat Research McAfee, 2011.
  2. Protecting Your Critical Assets Lessons Learned from “Operation Aurora” By McAfee Labs and McAfee Found stone Professional Services,2010.
  3. Mandiant. APT1: Exposing One of China's Cyber Espionage Unit.
  4. OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs Authors: Nart Villeneuve, James T. Bennett, Ned Moran, Thoufique Haq, Mike Scott, and Kenneth Geers. FireEye, White Paper.
  5. National Institute of Standards and Technology (NIST), Special Publication 800-39, Managing Information Security Risk, Organization, Mission, and Information System View, USA, 2011
  6. Advanced Persistent Threats: A Symantec Perspective Preparing the Right Defense for the New Threat Landscape. WHITE PAPER: Cutting Through The Hype(
  7. FireEye Labs. Fireeye advanced threat report 2013 (Special Report).
  8. Getting Owned By Malicious PDF – Analysis. GIAC (GPEN) Gold Certification Author: Mahmud Ab Rahman, This e-mail address is being protected from spambots. You need JavaScript enabled to view it . SANS Institute
  10. Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? Authors: Nikos Virvilis, Dimitris Gritzalis, Theodoros Apostolopoulos Information Security and Critical Infrastructure Protection Research Laboratory Dept. of Informatics, Athens University of Economics & Business (AUEB) 76 Patission Ave., Athens, GR-10434 Greece {nvir, dgrit, tca}
  11. In-Depth Look: APT Attack Tools of the Trade. Author: Kyle Wilhoit (Senior Threat Researcher) Trend Micro-TrendLabs Security Intelligence Blog.


APT, Malware, Security, Cyber, Hacking, Internet.