Discovering unknown advanced persistent threat using shared features mined by neural networks

被引:0
|
作者
Shang, Longkang [1 ]
Guo, Dong [2 ]
Ji, Yuede [3 ]
Li, Qiang [1 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun,130012, China
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China
[3] Department of Electrical and Computer Engineering, George Washington University, Washington, D.C., United States
基金
中国国家自然科学基金;
关键词
Statistical tests - C (programming language) - Deep learning - Network security - Learning systems;
D O I
暂无
中图分类号
学科分类号
摘要
Command and control channel(C&C) is used in some cyber attacks to remotely control infected hosts to steal data or conduct espionage. An effective type of C&C detection methods is network flow based. The insight is that network flow is evitable because the hidden malware in the target system has to communicate with the external C&C server to either receive commands or send data. However, existing network flow-based methods face two challenges to efficiently detect C&C of APT(Advanced persistent threat) attacks, i.e., stealth and flexible attack techniques. To combat these two challenges, we design a new network flow-based C&C detection method. Our work is inspired from two observations that different APT attacks share the same intrusion tools and services, and the unknown malware evolves from existing one. Therefore, the malwares of different groups have some shared attributes that are not easy to find, which leads to some hidden shared features in the network flows between the malware and the C&C server in different attacks. Based on this, we propose a method to detect the hidden C&C channel of unknown APT attacks. First, we use deep learning techniques to mine the shared network flow features from the known multi-class attack flows. Later, we use an appropriate classifier to detect the C&C network flow. Finally, we test our method on public available dataset. The experimental results show that our method can achieve up to F1 score of 0.968 when dealing with unknown malicious network flows. This will help discover unknown APT attacks. © 2021 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [31] Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach
    Almazmomi, Najah Kalifah
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [32] Feasibility Approach Based on SecMonet Framework to Protect Networks from Advanced Persistent Threat Attacks
    Salem, Maher
    Mohammed, Moayyad
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES, 2019, 29 : 333 - 343
  • [33] A Novel Threat Intelligence Detection Model Using Neural Networks
    Salem, Maher
    Al-Tamimi, Abdel-Karim
    IEEE ACCESS, 2022, 10 : 131229 - 131245
  • [35] Discovering and interpreting transcriptomic drivers of imaging traits using neural networks
    Smedley, Nova F.
    El-Saden, Suzie
    Hsu, William
    BIOINFORMATICS, 2020, 36 (11) : 3537 - 3548
  • [36] Discovering frequent subtrees from XML data using neural networks
    College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
    Wuhan Univ J Nat Sci, 2006, 1 (117-121):
  • [37] Training Neural Networks Using Features Replay
    Huo, Zhouyuan
    Gu, Bin
    Huang, Heng
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 31 (NIPS 2018), 2018, 31
  • [38] Discovering Novel Social Preferences Using Simple Artificial Neural Networks
    Ueshima, Atsushi
    Takikawa, Hiroki
    COLLABRA-PSYCHOLOGY, 2024, 10 (01)
  • [39] Using artificial neural networks to detect unknown computer worms
    Dima Stopel
    Robert Moskovitch
    Zvi Boger
    Yuval Shahar
    Yuval Elovici
    Neural Computing and Applications, 2009, 18 : 663 - 674
  • [40] Using artificial neural networks to detect unknown computer worms
    Stopel, Dima
    Moskovitch, Robert
    Boger, Zvi
    Shahar, Yuval
    Elovici, Yuval
    NEURAL COMPUTING & APPLICATIONS, 2009, 18 (07): : 663 - 674