Computational Forensics: The Essential Role of Logs in APT and Advanced Cyberattack Response
DOI:
https://doi.org/10.34190/iccws.20.1.3328Keywords:
Advanced Persistent Threats, computer forensics, Log analysis, Threat IntelligenceAbstract
Advanced Persistent Threats (APTs) represent one of the most complex challenges in modern cybersecurity, characterized by their stealth, persistence, and sophistication. This study investigates the critical yet underutilized role of log analysis in detecting and responding to APTs, drawing on semi-structured interviews with 12 cybersecurity professionals from diverse sectors. Findings highlight logs as indispensable tools for identifying anomalies, reconstructing attack timelines, and understanding adversary tactics, techniques, and procedures (TTPs). However, barriers such as overwhelming data volumes, lack of standardization, and limited analytical tools hinder their effective utilization. To address these challenges, the study proposes actionable recommendations, including the adoption of standardized log formats, AI-driven real-time analysis, enhanced visibility across systems, and collaboration for threat intelligence sharing. These findings underscore logs’ dual role as investigative assets and catalysts for improved cybersecurity resilience, offering a strategic roadmap for leveraging log analysis to counter evolving APT threats.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Raymond André Hagen

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.