{"title":"无线网络中的漏洞如何引发高级持续性威胁","authors":"R. Jover, P. Giura","doi":"10.15866/IRECOS.V12I6.16858","DOIUrl":null,"url":null,"abstract":"With the tremendous popularity of mobile devices an d their increasing adoption in the corporate environments, there is a larger oppor tunity for Advanced Persistent Threats (APTs) to exploit vulnerabilities in wireless and mobility networks. We review several vulnerabilities and successful attacks in this domain, and evaluate the possibility of these attacks to be used by APTs. Our analysis shows that known attacks in the mobili ty domain are powerful enough to contribute to the success of an APT operation. Copyright © 2013 Praise Worthy Prize S.r.l. - All r ights reserved.","PeriodicalId":392163,"journal":{"name":"International Review on Computers and Software","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats\",\"authors\":\"R. Jover, P. Giura\",\"doi\":\"10.15866/IRECOS.V12I6.16858\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the tremendous popularity of mobile devices an d their increasing adoption in the corporate environments, there is a larger oppor tunity for Advanced Persistent Threats (APTs) to exploit vulnerabilities in wireless and mobility networks. We review several vulnerabilities and successful attacks in this domain, and evaluate the possibility of these attacks to be used by APTs. Our analysis shows that known attacks in the mobili ty domain are powerful enough to contribute to the success of an APT operation. Copyright © 2013 Praise Worthy Prize S.r.l. - All r ights reserved.\",\"PeriodicalId\":392163,\"journal\":{\"name\":\"International Review on Computers and Software\",\"volume\":\"6 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Review on Computers and Software\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15866/IRECOS.V12I6.16858\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Review on Computers and Software","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15866/IRECOS.V12I6.16858","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7