Discovering unknown advanced persistent threat using shared features mined by neural networks

被引:0
|
作者
Shang, Longkang [1 ]
Guo, Dong [2 ]
Ji, Yuede [3 ]
Li, Qiang [1 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun,130012, China
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China
[3] Department of Electrical and Computer Engineering, George Washington University, Washington, D.C., United States
基金
中国国家自然科学基金;
关键词
Statistical tests - C (programming language) - Deep learning - Network security - Learning systems;
D O I
暂无
中图分类号
学科分类号
摘要
Command and control channel(C&C) is used in some cyber attacks to remotely control infected hosts to steal data or conduct espionage. An effective type of C&C detection methods is network flow based. The insight is that network flow is evitable because the hidden malware in the target system has to communicate with the external C&C server to either receive commands or send data. However, existing network flow-based methods face two challenges to efficiently detect C&C of APT(Advanced persistent threat) attacks, i.e., stealth and flexible attack techniques. To combat these two challenges, we design a new network flow-based C&C detection method. Our work is inspired from two observations that different APT attacks share the same intrusion tools and services, and the unknown malware evolves from existing one. Therefore, the malwares of different groups have some shared attributes that are not easy to find, which leads to some hidden shared features in the network flows between the malware and the C&C server in different attacks. Based on this, we propose a method to detect the hidden C&C channel of unknown APT attacks. First, we use deep learning techniques to mine the shared network flow features from the known multi-class attack flows. Later, we use an appropriate classifier to detect the C&C network flow. Finally, we test our method on public available dataset. The experimental results show that our method can achieve up to F1 score of 0.968 when dealing with unknown malicious network flows. This will help discover unknown APT attacks. © 2021 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [1] Discovering unknown advanced persistent threat using shared features mined by neural networks
    Shang, Longkang
    Guo, Dong
    Ji, Yuede
    Li, Qiang
    COMPUTER NETWORKS, 2021, 189
  • [2] A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks
    Li, Zitong
    Cheng, Xiang
    Sun, Lixiao
    Zhang, Ji
    Chen, Bing
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection
    Bahar, Athmane Ayoub Mansour
    Ferrahi, Kamel Soaid
    Messai, Mohamed-Lamine
    Seba, Hamida
    Amrouche, Karima
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [4] Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
    Charan, P. V. Sai
    Kumar, T. Gireesh
    Anand, P. Mohan
    EMERGING TECHNOLOGIES IN COMPUTER ENGINEERING: MICROSERVICES IN BIG DATA ANALYTICS, 2019, 985 : 45 - 54
  • [5] Deep Reinforcement Learning for Advanced Persistent Threat Detection in Wireless Networks
    Saheed, Kazeem
    Henna, Shagufta
    2023 31ST IRISH CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COGNITIVE SCIENCE, AICS, 2023,
  • [6] CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks
    Ramaki, Ali Ahmadian
    Ghaemi-Bafghi, Abbas
    Rasoolzadegan, Abbas
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 42
  • [7] Heterogeneous Graph Transformer for Advanced Persistent Threat Classification in Wireless Networks
    Saheed, Kazeem
    Henna, Shagufta
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 15 - 20
  • [8] Advanced Persistent Threat Attack Detection using Clustering Algorithms
    Alsanad, Ahmed
    Altuwaijri, Sara
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (09) : 640 - 649
  • [9] A Framework for Advanced Persistent Threat Attribution using Zachman Ontology
    Charan, P. V. Sai
    Chunduri, Hrushikesh
    Anand, P. Mohan
    Shukla, Sandeep K.
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 34 - 41
  • [10] Discovering influential text using convolutional neural networks
    Ayers, Megan
    Sanford, Luke
    Roberts, Margaret E.
    Yang, Eddie
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: ACL 2024, 2024, : 12002 - 12027