APT Attribution for Malware Based on Time Series Shapelets

被引:3
|
作者
Wang, Qinqin [1 ,2 ]
Yan, Hanbing [3 ]
Zhao, Chang [4 ]
Mei, Rui [1 ,2 ]
Han, Zhihui [3 ]
Zhou, Yu [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing, Peoples R China
[4] Beijing ChaitinTechnol Co Ltd, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
D O I
10.1109/TrustCom56396.2022.00108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To discover and defend against APT attacks more efficiently, we need to conduct binary analysis and source tracing research on APT malicious codes. This paper attributes APT groups for malicious codes from the perspective of binary similarity. First, we innovatively select the local features of the binary functions for classification and apply time series mining techniques to the mining of sequences of basic blocks (called paths). The Shapelet model selects path shapelets, which are path fragments that can best represent paths and are used to distinguish paths. Path shapelets can provide path-level interpretability for classification. Second, we use API calls to filter functions and generate paths of interest to reduce resource consumption. To evaluate the proposed method, we collect APT malicious codes based on publicly available threat intelligence reports. Our method filters 92.82% of functions and generates an average of 1.37 paths per function. The classification effect has obvious advantages over other methods.
引用
下载
收藏
页码:769 / 777
页数:9
相关论文
共 50 条
  • [1] Discovering Malware with Time Series Shapelets
    Patri, Om P.
    Wojnowicz, Michael T.
    Wolff, Matt
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 6079 - 6088
  • [2] Explainable APT Attribution for Malware Using NLP Techniques
    Wang, Qinqin
    Yan, Hanbing
    Han, Zhihui
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 70 - 80
  • [3] Attribution classification method of APT malware based on multi-feature fusion
    Zhang, Jian
    Liu, Shengquan
    Liu, Zhihua
    PLOS ONE, 2024, 19 (06):
  • [4] Fast Time Series Classification Based on Infrequent Shapelets
    He, Qing
    Dong, Zhi
    Zhuang, Fuzhen
    Shang, Tianfeng
    Shi, Zhongzhi
    2012 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2012), VOL 1, 2012, : 215 - 219
  • [5] Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls
    Shenderovitz, Gil
    Nissim, Nir
    COMPUTERS & SECURITY, 2024, 142
  • [6] A Novel Lazy Time Series Classification Algorithm Based on the Shapelets
    Wang Z.-H.
    Zhang W.
    Yuan J.-D.
    Liu H.-Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (01): : 29 - 43
  • [7] Shapelets-based Data Augmentation for Time Series Classification
    Li, Peiyu
    Boubrahimi, Soukaina Filali
    Hamdi, Shah Muhammad
    20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 1373 - 1378
  • [8] Subroutine based detection of APT malware
    Sexton J.
    Storlie C.
    Anderson B.
    Journal of Computer Virology and Hacking Techniques, 2016, 12 (4) : 225 - 233
  • [9] Learning Time-Series Shapelets
    Grabocka, Josif
    Schilling, Nicolas
    Wistuba, Martin
    Schmidt-Thieme, Lars
    PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 392 - 401
  • [10] Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques
    Li, Shudong
    Zhang, Qianqing
    Wu, Xiaobo
    Han, Weihong
    Tian, Zhihong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021