APT-Attack Detection Based on Multi-Stage Autoencoders
نویسندگان
چکیده
In the face of emerging technological achievements, cyber security remains a significant issue. Despite new possibilities that arise with such development, these do not come without drawback. Attackers make use to take advantage possible defects in systems. Advanced-persistent-threat (APT) attacks represent sophisticated are executed multiple steps. particular, network systems common target for APT where known or yet undiscovered vulnerabilities exploited. For this reason, intrusion detection (IDS) applied identify malicious behavioural patterns existing datasets. recent times, machine-learning (ML) algorithms used distinguish between benign and anomalous activity The application methods, especially autoencoders, has received attention achieving good results attacks. This paper builds on fact applies several autoencoder-based methods attack two datasets created by combining publicly available benchmark addition that, statistical analysis is determine features supplement anomaly process. An detector implemented evaluated combination both datasets, including experiment instances–APT-attack an independent test dataset zero-day-attack dataset. conducted experiments provide promising plausibility performance algorithms. Finally, discussion provided suggestions improvements detector.
منابع مشابه
Multi-agent anomaly-based APT detection
Protecting corporate networks against persistent malware infections is becoming an increasingly difficult challenge. Most networks will suffer from an infection sooner or later, and when this happens, it is very important to identify the compromised host as quickly as possible before any real damage is done. Therefore we focus in this paper on the detection of the command & control channel betw...
متن کاملPolymorphic Malicious JavaScript Code Detection for APT Attack Defence
The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately detect new malicious behaviors are crucial. This paper proposes a method that defines the malicious behaviors of malware using conc...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملMalware Detection and Prevention System Based on Multi-Stage Rules
The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule gen...
متن کاملRegional Priority Based Anomaly Detection using Autoencoders
In the recent times, autoencoders, besides being used for compression, have been proven quite useful even for regenerating similar images or help in image denoising. They have also been explored for anomaly detection in a few cases. However, due to location invariance property of convolutional neural network, autoencoders tend to learn from or search for learned features in the complete image. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app12136816