Innovative Techniques for Cyber Threat Management Against Advanced Persistent Therats (APTs) / (Record no. 615840)

000 -LEADER
fixed length control field 02647nam a22001697a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUST
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,HAI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Haider, Raja Zeeshan
9 (RLIN) 131714
245 ## - TITLE STATEMENT
Title Innovative Techniques for Cyber Threat Management Against Advanced Persistent Therats (APTs) /
Statement of responsibility, etc. Raja Zeeshan Haider
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Rawalpindi,
Name of publisher, distributor, etc. MCS (NUST),
Date of publication, distribution, etc. 2025
300 ## - PHYSICAL DESCRIPTION
Extent xi, 102 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note The information age has been revolutionizing the world by bringing a plethora<br/>of opportunities with associated challenges. Cyber threats are eminent due to<br/>the increased dependence on the internet and the information infrastructure.<br/>The rapid evolution of cyber threats, particularly Advanced Persistent Threats<br/>(APTs), has highlighted the critical need for comprehensive and innovative threat<br/>management techniques. Detection of targeted attacks requires innovative and<br/>cutting-edge techniques for timely mitigation. The research examines a multipronged<br/>approach by considering the way existing solutions can be upgraded<br/>and the way new technology domains can be incorporated for the cyber threat<br/>management of APTs. C2-DNSEye, an encompassing framework has been introduced<br/>for detecting APTs, during developmental stages through the discovery of<br/>command and control channels, established by employing the Domain Name System<br/>(DNS). C2-DNSEye integrates host-specific activity with the corresponding<br/>network-specific activity, to determine the maliciousness of a DNS request. C2-<br/>DNSEye enables the detection of targeted attacks with an F1-Score of 98.70%.<br/>Likewise, the emerging technology domain of digital twins has been incorporated<br/>for effective cyber threat management. A novel intrusion indicator-based ontology<br/>modelling has been defined to facilitate the adoption of digital twins for APTs<br/>simulation and orchestration in the virtual environment. The ontology modelling<br/>facilitates the virtual replication of physical systems for threat monitoring and<br/>prediction through simulation and real-time input of attack indicators. The ontology<br/>delineates mechanisms to determine the operational effectiveness and cyber<br/>readiness of the Critical Information Infrastructure (CII) through virtual modelling,<br/>attack simulation, and anomaly detection. APT campaigns of HoneyBee,<br/>Sunburst, Hangover, Fin7 and DarkHotel have been evaluated under the pretext<br/>of the proposed ontology. Furthermore, the ontology modelling stipulates threat<br/>hunting mechanisms to make CII cyber resilient.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PhD Information Security Thesis
9 (RLIN) 132793
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name PhD IS Thesis
9 (RLIN) 132794
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervised by Dr. Baber Aslam
9 (RLIN) 132769
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Thesis 01/17/2026   005.8,HAI MCSPhD IS-15 01/17/2026 01/17/2026 Thesis Almirah No.68, Shelf No.5
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.