Discovering unknown advanced persistent threat using shared features mined by neural networks

被引:0
|
作者
Shang, Longkang [1 ]
Guo, Dong [2 ]
Ji, Yuede [3 ]
Li, Qiang [1 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun,130012, China
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China
[3] Department of Electrical and Computer Engineering, George Washington University, Washington, D.C., United States
基金
中国国家自然科学基金;
关键词
Statistical tests - C (programming language) - Deep learning - Network security - Learning systems;
D O I
暂无
中图分类号
学科分类号
摘要
Command and control channel(C&C) is used in some cyber attacks to remotely control infected hosts to steal data or conduct espionage. An effective type of C&C detection methods is network flow based. The insight is that network flow is evitable because the hidden malware in the target system has to communicate with the external C&C server to either receive commands or send data. However, existing network flow-based methods face two challenges to efficiently detect C&C of APT(Advanced persistent threat) attacks, i.e., stealth and flexible attack techniques. To combat these two challenges, we design a new network flow-based C&C detection method. Our work is inspired from two observations that different APT attacks share the same intrusion tools and services, and the unknown malware evolves from existing one. Therefore, the malwares of different groups have some shared attributes that are not easy to find, which leads to some hidden shared features in the network flows between the malware and the C&C server in different attacks. Based on this, we propose a method to detect the hidden C&C channel of unknown APT attacks. First, we use deep learning techniques to mine the shared network flow features from the known multi-class attack flows. Later, we use an appropriate classifier to detect the C&C network flow. Finally, we test our method on public available dataset. The experimental results show that our method can achieve up to F1 score of 0.968 when dealing with unknown malicious network flows. This will help discover unknown APT attacks. © 2021 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [41] Parallel training for neural networks using PVM with shared memory
    Araújo, MAA
    Teixeira, EP
    Camargo, FR
    Almeida, JPV
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 1315 - 1322
  • [42] Learning active subspaces and discovering important features with Gaussian radial basis functions neural networks
    D'Agostino, Danny
    Ilievski, Ilija
    Shoemaker, Christine Annette
    NEURAL NETWORKS, 2024, 176
  • [43] Advanced Persistent Threat Mitigation Using Multi Level Security - Access Control Framework
    Zulkefli, Zakiah
    Singh, Manmeet Mahinderjit
    Malim, Nurul Hashimah Ahamed Hassain
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 90 - 105
  • [44] Early Detection of the Advanced Persistent Threat Attack Using Performance Analysis of Deep Learning
    Hassannataj Joloudari, Javad
    Haderbadi, Mojtaba
    Mashmool, Amir
    Ghasemigol, Mohammad
    Band, Shahab S.
    Mosavi, Amir
    IEEE ACCESS, 2020, 8 : 186125 - 186137
  • [45] Topological measurement of deep neural networks using persistent homology
    Satoru Watanabe
    Hayato Yamana
    Annals of Mathematics and Artificial Intelligence, 2022, 90 : 75 - 92
  • [46] Topological measurement of deep neural networks using persistent homology
    Watanabe, Satoru
    Yamana, Hayato
    ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2022, 90 (01) : 75 - 92
  • [47] EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS
    Luo, Yali
    Ao, Shengqin
    Luo, Ning
    Su, Changxin
    Yang, Peian
    Jiang, Zhengwei
    ADVANCES IN DIGITAL FORENSICS XVII, 2021, 612 : 193 - 211
  • [48] Discovering Associations Among Technologies Using Neural Networks for Tech-Mining
    Azimi, Sasan
    Veisi, Hadi
    Fateh-rad, Mahdi
    Rahmani, Rouhollah
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (04) : 1394 - 1404
  • [49] Predicting Wireless Channel Features using Neural Networks
    Navabi, Shiva
    Wang, Chenwei
    Bursalioglu, Ozgun Y.
    Papadopoulos, Haralabos
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [50] Manufacturing features recognition using backpropagation neural networks
    Department of Industrial Engineering, Natl. Univ. of Sci. and Technology, ASCOT, PO Box AC 939, Bulawayo, Zimbabwe
    J Intell Manuf, 3 (289-299):