Next Article in Journal
Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
Previous Article in Journal
A Virtual Combustion Sensor Based on Ion Current for Lean-Burn Natural Gas Engine
Previous Article in Special Issue
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Systematic Review

Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework

by
Thulfiqar Jabar
and
Manmeet Mahinderjit Singh
*
School of Computer Science, Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(13), 4662; https://doi.org/10.3390/s22134662
Submission received: 7 May 2022 / Revised: 4 June 2022 / Accepted: 8 June 2022 / Published: 21 June 2022
(This article belongs to the Special Issue Security and Privacy in the Internet of Things (IoT))

Abstract

During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and availability (CIA) of the information. One attack that occurs is Advanced Persistent Threat (APT). Attackers can manipulate a device’s behavior, applications, and services. Such manipulations lead to signification of a deviation from a known behavioral baseline for smartphones. In this study, the authors present a Systematic Literature Review (SLR) to provide a survey of the existing literature on APT defense mechanisms, find research gaps, and recommend future directions. The scope of this SLR covers a detailed analysis of most cybersecurity defense mechanisms and cutting-edge solutions. In this research, 112 papers published from 2011 until 2022 were analyzed. This review has explored different approaches used in cybersecurity and their effectiveness in defending against APT attacks. In a conclusion, we recommended a Situational Awareness (SA) model known as Observe–Orient–Decide–Act (OODA) to provide a comprehensive solution to monitor the device’s behavior for APT mitigation.
Keywords: Situational Awareness (SA); Observe–Orient–Decide–Act (OODA); risk management; trust management; zero trust; threat modeling; fingerprint; security; privacy; Internet of Things (IoT) Situational Awareness (SA); Observe–Orient–Decide–Act (OODA); risk management; trust management; zero trust; threat modeling; fingerprint; security; privacy; Internet of Things (IoT)

Share and Cite

MDPI and ACS Style

Jabar, T.; Mahinderjit Singh, M. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Sensors 2022, 22, 4662. https://doi.org/10.3390/s22134662

AMA Style

Jabar T, Mahinderjit Singh M. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Sensors. 2022; 22(13):4662. https://doi.org/10.3390/s22134662

Chicago/Turabian Style

Jabar, Thulfiqar, and Manmeet Mahinderjit Singh. 2022. "Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework" Sensors 22, no. 13: 4662. https://doi.org/10.3390/s22134662

APA Style

Jabar, T., & Mahinderjit Singh, M. (2022). Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Sensors, 22(13), 4662. https://doi.org/10.3390/s22134662

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop