APT Attack Detection Based on Graph Convolutional Neural Networks

被引:2
|
作者
Ren, Weiwu [1 ]
Song, Xintong [1 ]
Hong, Yu [2 ]
Lei, Ying [1 ]
Yao, Jinyu [1 ]
Du, Yazhou [1 ]
Li, Wenjuan [1 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130000, Jilin, Peoples R China
[2] Natl Comp Network Emergency Response Ctr, Jilin Branch, Changchun 130000, Jilin, Peoples R China
关键词
APT attack detection; Graph convolutional neural networks; Knowledge graph; Vulnerability exploits;
D O I
10.1007/s44196-023-00369-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks that pose significant challenges to the information security of governments and enterprises. Traditional detection methods struggle to extract long-term relationships within these attacks effectively. This paper proposes an APT attack detection model based on graph convolutional neural networks (GCNs) to address this issue. The aim is to detect known attacks based on vulnerabilities and attack contexts. We extract organization-vulnerability relationships from publicly available APT threat intelligence, along with the names and relationships of software security entities from CVE, CWE, and CAPEC, to generate triple data and construct a knowledge graph of APT attack behaviors. This knowledge graph is transformed into a homogeneous graph, and GCNs are employed to process graph features, enabling effective APT attack detection. We evaluate the proposed method on the dataset constructed in this paper. The results show that the detection accuracy of the GCN method reaches 95.9%, improving by approximately 2.1% compared to the GraphSage method. This approach proves to be effective in real-world APT attack detection scenarios.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Imperceptible graph injection attack on graph neural networks
    Yang Chen
    Zhonglin Ye
    Zhaoyang Wang
    Haixing Zhao
    [J]. Complex & Intelligent Systems, 2024, 10 : 869 - 883
  • [42] Graph Convolutional Neural Networks with Additional Feature Graph
    Sun, Jun-Shu
    Wang, Shu-Hui
    Yang, Chen-Xue
    Huang, Qing-Ming
    Cheng, Reynold C. K.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (09): : 1900 - 1918
  • [43] Missing nodes detection for complex networks based on graph convolutional networks
    Liu C.
    Li Z.
    Zhou L.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) : 9145 - 9158
  • [44] A semantic backdoor attack against graph convolutional networks
    Dai, Jiazhu
    Xiong, Zhipeng
    Cao, Chenhong
    [J]. NEUROCOMPUTING, 2024, 600
  • [45] Community detection based on BernNet graph convolutional neural network
    Hui Xie
    Yixin Ning
    [J]. Journal of the Korean Physical Society, 2023, 83 : 386 - 395
  • [46] Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks
    Tang, Binhui
    Wang, Junfeng
    Qiu, Huanran
    Yu, Jian
    Yu, Zhongkun
    Liu, Shijia
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (01): : 235 - 252
  • [47] Community detection based on BernNet graph convolutional neural network
    Xie, Hui
    Ning, Yixin
    [J]. JOURNAL OF THE KOREAN PHYSICAL SOCIETY, 2023, 83 (05) : 386 - 395
  • [48] Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
    Tolosana, Ruben
    Gomez-Barrero, Marta
    Kolberg, Jascha
    Morales, Aythami
    Busch, Christoph
    Ortega-Garcia, Javier
    [J]. 2018 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2018,
  • [49] A novel face presentation attack detection scheme based on multi-regional convolutional neural networks
    Ma, Yukun
    Wu, Lifang
    Li, Zeyu
    Liu, Fanghao
    [J]. PATTERN RECOGNITION LETTERS, 2020, 131 : 261 - 267
  • [50] IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks
    Wang, Jiushuang
    Liu, Ying
    Feng, Huifen
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (02) : 1280 - 1303