Understanding the sophisticated and targeted attacks that persistently seeking to achieve specific compromised goal.