APT-Attack Detection Based on Multi-Stage Autoencoders

نویسندگان

چکیده

In the face of emerging technological achievements, cyber security remains a significant issue. Despite new possibilities that arise with such development, these do not come without drawback. Attackers make use to take advantage possible defects in systems. Advanced-persistent-threat (APT) attacks represent sophisticated are executed multiple steps. particular, network systems common target for APT where known or yet undiscovered vulnerabilities exploited. For this reason, intrusion detection (IDS) applied identify malicious behavioural patterns existing datasets. recent times, machine-learning (ML) algorithms used distinguish between benign and anomalous activity The application methods, especially autoencoders, has received attention achieving good results attacks. This paper builds on fact applies several autoencoder-based methods attack two datasets created by combining publicly available benchmark addition that, statistical analysis is determine features supplement anomaly process. An detector implemented evaluated combination both datasets, including experiment instances–APT-attack an independent test dataset zero-day-attack dataset. conducted experiments provide promising plausibility performance algorithms. Finally, discussion provided suggestions improvements detector.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-agent anomaly-based APT detection

Protecting corporate networks against persistent malware infections is becoming an increasingly difficult challenge. Most networks will suffer from an infection sooner or later, and when this happens, it is very important to identify the compromised host as quickly as possible before any real damage is done. Therefore we focus in this paper on the detection of the command & control channel betw...

متن کامل

Polymorphic Malicious JavaScript Code Detection for APT Attack Defence

The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately detect new malicious behaviors are crucial. This paper proposes a method that defines the malicious behaviors of malware using conc...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

Malware Detection and Prevention System Based on Multi-Stage Rules

The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule gen...

متن کامل

Regional Priority Based Anomaly Detection using Autoencoders

In the recent times, autoencoders, besides being used for compression, have been proven quite useful even for regenerating similar images or help in image denoising. They have also been explored for anomaly detection in a few cases. However, due to location invariance property of convolutional neural network, autoencoders tend to learn from or search for learned features in the complete image. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app12136816