A novel approach for APT attack detection based on an advanced computing

被引:2
|
作者
Xuan, Cho Do [1 ]
Nguyen, Tung Thanh [2 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
[2] Minist Informat & Commun, Natl Inst Digital Technol & Digital Transformat, Hanoi, Vietnam
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
BiLSTM; Attention; Dynamic graph convolutional neural network; APT attack detection; ADVANCED PERSISTENT THREATS; NETWORK;
D O I
10.1038/s41598-024-72957-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To enhance the effectiveness of the Advanced Persistent Threat (APT) detection process, this research proposes a new approach to build and analyze the behavior profiles of APT attacks in network traffic. To achieve this goal, this study carries out two main objectives, including (i) building the behavior profile of APT IP in network traffic using a new intelligent computation method; (ii) analyzing and evaluating the behavior profile of APT IP based on a deep graph network. Specifically, to build the behavior profile of APT IP, this article describes using a combination of two different data mining methods: Bidirectional Long Short-Term Memory (Bi) and Attention (A). Based on the obtained behavior profile, the Dynamic Graph Convolutional Neural Network (DGCNN) is proposed to extract the characteristics of APT IP and classify them. With the flexible combination of different components in the model, the important information and behavior of APT attacks are demonstrated, not only enhancing the accuracy of detecting attack campaigns but also reducing false predictions. The experimental results in the paper show that the method proposed in this study has brought better results than other approaches on all measurements. In particular, the accuracy of APT attack prediction results (Precision) reached from 84 to 91%, higher than other studies of over 7%. These experimental results have proven that the proposed BiADG model for detecting APT attacks in this study is proper and reasonable. In addition, those experimental results have not only proven the effectiveness and superiority of the proposed method in detecting APT attacks but have also opened up a new approach for other cyber-attack detections such as distributed denial of service, botnets, malware, phishing, etc.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm
    Abdullayeva, Fargana J.
    ARRAY, 2021, 10
  • [42] APT attack detection based on flow network analysis techniques using deep learning
    Cho Do Xuan
    Mai Hoang Dao
    Hoa Dinh Nguyen
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (03) : 4785 - 4801
  • [43] Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
    Liu, Donglan
    Zhang, Hao
    Yu, Hao
    Liu, Xin
    Zhao, Yong
    Lv, Guodong
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 701 - 704
  • [44] Multi-stage detection method for APT attack based on sample feature reinforcement
    Xie, Lixia
    Li, Xueou
    Yang, Hongyu
    Zhang, Liang
    Cheng, Xiang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 66 - 76
  • [45] A novel approach for software vulnerability detection based on intelligent cognitive computing
    Cho Do Xuan
    Dao Hoang Mai
    Ma Cong Thanh
    Bui Van Cong
    The Journal of Supercomputing, 2023, 79 : 17042 - 17078
  • [46] A novel approach for software vulnerability detection based on intelligent cognitive computing
    Xuan, Cho Do
    Mai, Dao Hoang
    Thanh, Ma Cong
    Van Cong, Bui
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (15): : 17042 - 17078
  • [47] The Optimized Attribute Attack Graph Based on APT Attack Stage Model
    Li, Meicong
    Huang, Wei
    Wang, Yongbin
    Fan, Wenqing
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2781 - 2785
  • [48] Cause-effectgraph enhanced APT attack detection algorithm
    Guangming Z.
    Zijie L.
    Jiawei F.
    Xiangdong Z.
    Fengjun Z.
    Zuoyuan N.
    Liang Z.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (05): : 107 - 117
  • [49] APT datasets and attack modeling for automated detection methods: A review
    Stojanovic, Branka
    Hofer-Schmitz, Katharina
    Kleb, Ulrike
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [50] Novel Reservoir Computing Approach for the Detection of Chaos
    Ismail, Ali Rida
    Jovanovic, Slavisa
    Petit-Watelot, Sebastien
    Rabah, Hassan
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,