Detection and Classification of Advanced Persistent Threats and Attacks Using the Support Vector Machine

被引:22
|
作者
Chu, Wen-Lin [1 ]
Lin, Chih-Jer [2 ]
Chang, Ke-Neng [2 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Mech Engn, Taichung 41170, Taiwan
[2] Natl Taipei Univ Technol, Grad Inst Automat Technol, Taipei 10608, Taiwan
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 21期
关键词
advanced persistent threat; principal component analysis; support vector machine; naive Bayes classification; decision tree; multilayer perceptron;
D O I
10.3390/app9214579
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Traditional network attack and hacking models are constantly evolving to keep pace with the rapid development of network technology. Advanced persistent threat (APT), usually organized by a hacker group, is a complex and targeted attack method. A long period of strategic planning and information search usually precedes an attack on a specific goal. Focus is on a targeted object and customized specific methods are used to launch the attack and obtain confidential information. This study offers an attack detection system that enables early discovery of the APT attack. The system uses the NSL-KDD database for attack detection and verification. The main method uses principal component analysis (PCA) for feature sampling and the enhancement of detection efficiency. The advantages and disadvantages of using the classifiers are then compared to detect the dataset, the classifier supports the vector machine, naive Bayes classification, the decision tree and neural networks. Results of the experiments show the support vector machine (SVM) to have the highest recognition rate, reaching 97.22% (for the trained subdata A). The purpose of this study was to establish an APT early warning model mechanism, that could be used to reduce the impact and influence of APT attacks.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine
    Tan, Jiayu
    Wang, Jian
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 153 - 165
  • [2] Efficient Classification of Portscan Attacks using Support Vector Machine
    Vidhya, M.
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2013,
  • [3] Distributed Denial of Service Attacks Detection Using Support Vector Machine
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    Hussain, Muhammad
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134
  • [4] Detection of Malicious Network Traffic Attacks Using Support Vector Machine
    Dwivedi, Devanshi
    Bhushan, Aditya
    Singh, Ashutosh Kumar
    Snehlata
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 54 - 68
  • [5] Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification
    Siddiqui, Sana
    Khan, Muhammad Salman
    Ferens, Ken
    Kinsner, Witold
    [J]. IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 64 - 69
  • [6] Using statistical analysis and support vector machine classification to detect complicated attacks
    Tian, M
    Chen, SC
    Zhuang, Y
    Liu, J
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2747 - 2752
  • [7] Ultrasonic Flaw Detection using Support Vector Machine Classification
    Virupakshappa, Kushal
    Oruklu, Erdal
    [J]. 2015 IEEE INTERNATIONAL ULTRASONICS SYMPOSIUM (IUS), 2015,
  • [8] Fault classification and ground detection using support vector machine
    Samantaray, S. R.
    Dash, P. K.
    Panda, G.
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 2049 - +
  • [9] An Implementation of Tracing Attacks on Advanced Persistent Threats by Using Actors Model
    Murakami, Takatoshi
    Kumano, Shuhei
    Koide, Hiroshi
    [J]. 2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, : 1316 - 1320
  • [10] Classification of Attacks Using Support Vector Machine (SVM) on KDDCUP'99 IDS Database
    Kotpalliwar, Manjiri V.
    Wajgi, Rakhi
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 987 - 990