A novel approach for APT attack detection based on an advanced computing

被引:2
|
作者
Xuan, Cho Do [1 ]
Nguyen, Tung Thanh [2 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
[2] Minist Informat & Commun, Natl Inst Digital Technol & Digital Transformat, Hanoi, Vietnam
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
BiLSTM; Attention; Dynamic graph convolutional neural network; APT attack detection; ADVANCED PERSISTENT THREATS; NETWORK;
D O I
10.1038/s41598-024-72957-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To enhance the effectiveness of the Advanced Persistent Threat (APT) detection process, this research proposes a new approach to build and analyze the behavior profiles of APT attacks in network traffic. To achieve this goal, this study carries out two main objectives, including (i) building the behavior profile of APT IP in network traffic using a new intelligent computation method; (ii) analyzing and evaluating the behavior profile of APT IP based on a deep graph network. Specifically, to build the behavior profile of APT IP, this article describes using a combination of two different data mining methods: Bidirectional Long Short-Term Memory (Bi) and Attention (A). Based on the obtained behavior profile, the Dynamic Graph Convolutional Neural Network (DGCNN) is proposed to extract the characteristics of APT IP and classify them. With the flexible combination of different components in the model, the important information and behavior of APT attacks are demonstrated, not only enhancing the accuracy of detecting attack campaigns but also reducing false predictions. The experimental results in the paper show that the method proposed in this study has brought better results than other approaches on all measurements. In particular, the accuracy of APT attack prediction results (Precision) reached from 84 to 91%, higher than other studies of over 7%. These experimental results have proven that the proposed BiADG model for detecting APT attacks in this study is proper and reasonable. In addition, those experimental results have not only proven the effectiveness and superiority of the proposed method in detecting APT attacks but have also opened up a new approach for other cyber-attack detections such as distributed denial of service, botnets, malware, phishing, etc.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] A study on cyber threat prediction based on intrusion detection event for APT attack detection
    Kim, Yong-Ho
    Park, Won Hyung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (02) : 685 - 698
  • [22] A study on cyber threat prediction based on intrusion detection event for APT attack detection
    Yong-Ho Kim
    Won Hyung Park
    Multimedia Tools and Applications, 2014, 71 : 685 - 698
  • [23] Optimization of APT attack detection based on a model combining ATTENTION and deep learning
    Cho Do Xuan
    Duc Duong
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (04) : 4135 - 4151
  • [24] APT Attack Detection of a New Power System based on DPI-transformer
    Zhang, Yazhuo
    Li, Yuancheng
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (02) : 99 - 106
  • [25] APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning
    Li, Jiacheng
    Li, Tong
    Zhang, Runzi
    Wu, Di
    Yue, Hao
    Yang, Zhen
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 10 - 19
  • [26] Ontology Modeling for APT Attack Detection in an IoT-Based Power System
    Kim, Gihoon
    Choi, Chang
    Choi, Junho
    PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, : 160 - 164
  • [27] A Multi-stage APT Attack Detection Method Based on Sample Enhancement
    Xie, Lixia
    Li, Xueou
    Yang, Hongyu
    Zhang, Liang
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 209 - 216
  • [28] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Yan, Junwei
    Jiang, Tao
    Lin, Liwei
    Wu, Zhengyu
    Ye, Xiucai
    Tian, Mengke
    Wang, Yong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [29] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Junwei Yan
    Tao Jiang
    Liwei Lin
    Zhengyu Wu
    Xiucai Ye
    Mengke Tian
    Yong Wang
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [30] A Novel Immune Detection Approach Enhanced by Attack Graph Based Correlation
    Melo, Roberto Vasconcelos
    de Macedo, Douglas D. J.
    Dantas, Mario A. R.
    de Bona, Luis C. E.
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 830 - 835