Stealth tactics in cyber-attack

  • Chris Jones

Student thesis: Doctoral ThesisDoctor of Professional Studies

Abstract

Protecting digital assets and data remains a critical concern. Traditional cybersecurity systems, such as Intrusion Detection and Prevention Systems (IDPS) and next-generation firewalls, are effective against many threats but often fail to detect low-profile, stealthy attacks involving manual interaction and detailed reconnaissance.

This study examines the benign characteristics and pauses in such attacks during reconnaissance by analysing multiple network streams that display these elusive traits. The research identifies key indicators that can enhance detection mechanisms in future security solutions.

Findings show that malicious attacks often follow benign-looking traffic marked by elongated pauses. By leveraging these patterns, businesses could improve detection with minimal computing resources, potentially reducing the carbon footprint of edge security appliances.

The suggested solutions in this research rely on long-term monitoring to detect returning traffic that changes in nature. These methods could make low-profile attacks less elusive if applied in enterprise solutions.
Date of Award2025
Original languageEnglish
Awarding Institution
  • Aberystwyth University
SupervisorChris Price (Supervisor)

Keywords

  • stealth tactics
  • cyber-attacks
  • reconnaissance
  • intrusion detection
  • anomaly detection
  • cybersecurity

Cite this

'