Table 9.
Summary of studies on advanced persistent threat (APT) detection techniques, aggregated by single-stage or multistage APT.
Technique | APT detection (single stage) | APT fingerprint (multistage) |
---|---|---|
Machine learning | [66,67,76,78,80,83,84,86,88,92,100,102,103,107,109,110,113,114,[117], [118], [119], [120]] | [89,93,[95], [96], [97],112,121,125] |
Deep learning | [71,75,82,90,91,98,104,105,108,123,126,129,130,133] | [124,128] |
Static analysis | [81,94,101] | |
Other artificial intelligence techniques | [70,72,74,77,79,122,132] | [131] |
Statistical analysis | [65,68,73,85,87,116] | [69,99,111,127] |