A novel approach for APT attack detection based on an advanced computing

被引:2
|
作者
Xuan, Cho Do [1 ]
Nguyen, Tung Thanh [2 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
[2] Minist Informat & Commun, Natl Inst Digital Technol & Digital Transformat, Hanoi, Vietnam
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
BiLSTM; Attention; Dynamic graph convolutional neural network; APT attack detection; ADVANCED PERSISTENT THREATS; NETWORK;
D O I
10.1038/s41598-024-72957-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To enhance the effectiveness of the Advanced Persistent Threat (APT) detection process, this research proposes a new approach to build and analyze the behavior profiles of APT attacks in network traffic. To achieve this goal, this study carries out two main objectives, including (i) building the behavior profile of APT IP in network traffic using a new intelligent computation method; (ii) analyzing and evaluating the behavior profile of APT IP based on a deep graph network. Specifically, to build the behavior profile of APT IP, this article describes using a combination of two different data mining methods: Bidirectional Long Short-Term Memory (Bi) and Attention (A). Based on the obtained behavior profile, the Dynamic Graph Convolutional Neural Network (DGCNN) is proposed to extract the characteristics of APT IP and classify them. With the flexible combination of different components in the model, the important information and behavior of APT attacks are demonstrated, not only enhancing the accuracy of detecting attack campaigns but also reducing false predictions. The experimental results in the paper show that the method proposed in this study has brought better results than other approaches on all measurements. In particular, the accuracy of APT attack prediction results (Precision) reached from 84 to 91%, higher than other studies of over 7%. These experimental results have proven that the proposed BiADG model for detecting APT attacks in this study is proper and reasonable. In addition, those experimental results have not only proven the effectiveness and superiority of the proposed method in detecting APT attacks but have also opened up a new approach for other cyber-attack detections such as distributed denial of service, botnets, malware, phishing, etc.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] An advanced computing approach for software vulnerability detection
    Do Xuan C.
    Cong B.V.
    Multimedia Tools and Applications, 2024, 83 (39) : 86707 - 86740
  • [32] A Research on Architecture of APT Attack Detection and Countering Technology
    Chen R.-D.
    Zhang X.-S.
    Niu W.-N.
    Lan H.-Y.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (06): : 870 - 879
  • [33] A Novel Hybrid Approach for Detection of DDoS Attack
    Redekar, Pooja
    Chatterjee, Madhumita
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 251 - 255
  • [34] DDoS attack detection algorithms based on entropy computing
    Li, Liying
    Zhou, Jianying
    Xiao, Ning
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 452 - +
  • [35] SYN Flooding Attack Detection Based on Entropy Computing
    Bellaiche, Martine
    Gregoire, Jean-Charles
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1079 - 1084
  • [36] Attack path prediction of APT based on HMM
    Du Z.
    Liu F.
    Li Y.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2019, 41 (04): : 826 - 834
  • [37] Research on APT attack based on game model
    Su Yang
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 295 - 299
  • [38] NGSIEM Based APT Attack Analysis System
    Li, Yanfei
    Wang, Rui
    Li, Haiwei
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [39] An APT Trojans Detection Method for Cloud Computing Based on Memory Analysis and FCM
    Ge, Liang
    Wang, Lianhai
    Xu, Lijuan
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 179 - 183
  • [40] An APT Trojans Detection Method for Cloud Computing Based on Memory Analysis and FCM
    Ge, Liang
    Wang, Lianhai
    Xu, Lijuan
    Proceedings - 2016 3rd International Conference on Information Science and Control Engineering, ICISCE 2016, 2016, : 179 - 183