APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning

被引:0
|
作者
Li, Jiacheng [1 ]
Li, Tong [1 ]
Zhang, Runzi [2 ]
Wu, Di [1 ]
Yue, Hao [1 ]
Yang, Zhen [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
[2] NSFOCUS Technol Grp Co Ltd, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
attack detection; attack path; provenance graph; few-shot learning;
D O I
10.1109/TrustCom60117.2023.00025
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced persistent threat (APT) attack leverages various intelligence-gathering techniques to obtain sensitive and critical information, imposing increasing threats to modern software enterprises. However, due to the persistent presence of APT attacks, it is difficult to effectively analyze a large amount of audit data for detecting such attacks, especially for small and medium-sized enterprises (SMEs). This limitation hinders security operation centers (SOC) from promptly handling APT attacks. In this paper, we propose an attack path-based method (APM) for APT attack detection on few-shot learning. Specifically, APM first identifies candidate malicious entities from the provenance graph, contributing to the completion of the missing attack paths. Secondly, we propose a systematic method to exploit potential attack behaviors in the attack path based on the identified candidate malicious entities. We evaluate APM through five APT attacks in realistic environments. Compared to existing baselines, the precision, recall, and F1-score of APM for attack detection increased by 0.28%, 1.64%, and 1.13%, respectively. The results show that our proposal can outperform baseline approaches and effectively detect APT attacks based on few-shot learning.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 50 条
  • [21] Joint Alignment Networks For Few-Shot Website Fingerprinting Attack
    Zhou, Qiang
    Wang, Liangmin
    Zhu, Huijuan
    Lu, Tong
    Song, Heping
    COMPUTER JOURNAL, 2024, 67 (06): : 2331 - 2345
  • [22] Dynamic Knowledge Path Learning for Few-Shot Learning
    Li, Jingzhu
    Yin, Zhe
    Yang, Xu
    Jiao, Jianbin
    Ding, Ye
    BIG DATA MINING AND ANALYTICS, 2025, 8 (02): : 479 - 495
  • [23] NFHP-RN: A Method of Few-Shot Network Attack Detection Based on the Network Flow Holographic Picture-ResNet
    Yi, Tao
    Chen, Xingshu
    Yang, Mingdong
    Li, Qindong
    Zhu, Yi
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 140 (01): : 929 - 955
  • [24] Few-Shot Learning with Novelty Detection
    Bjerge, Kim
    Bodesheim, Paul
    Karstoft, Henrik
    DEEP LEARNING THEORY AND APPLICATIONS, PT I, DELTA 2024, 2024, 2171 : 340 - 363
  • [25] A Feature Extraction Method Based on Few-shot Learning
    Liu, Sa
    Pang, Shanmin
    Zhu, Li
    Zhao, Jiakun
    2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAICE 2020), 2020, : 528 - 532
  • [26] A few-shot network intrusion detection method based on mutual centralized learning
    Congyuan Xu
    Fan Zhang
    Ziqi Yang
    Zhihao Zhou
    Yuqi Zheng
    Scientific Reports, 15 (1)
  • [27] A Hybrid Few-Shot Learning Based Intrusion Detection Method for Internet of Vehicles
    Zhao, Yixuan
    Cui, Jianming
    Liu, Ming
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT II, 2024, 14488 : 207 - 220
  • [28] A defect detection method for topological phononic materials based on few-shot learning
    Zhang, Beini
    Luo, Xiao
    Lyu, Yetao
    Wu, Xiaoxiao
    Wen, Weijia
    NEW JOURNAL OF PHYSICS, 2022, 24 (08):
  • [29] MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning
    Guan, Lei
    Liu, Fan
    Zhang, Ru
    Liu, Jianyi
    Tang, Yifan
    SENSORS, 2023, 23 (21)
  • [30] A Survey of Few-Shot Learning: An Effective Method for Intrusion Detection
    Duan, Ruixue
    Li, Dan
    Tong, Qiang
    Yang, Tao
    Liu, Xiaotong
    Liu, Xiulei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021