Nation-State Threat Actor Attribution Using Fuzzy Hashing
نویسندگان
چکیده
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) been waging covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions be imposed, malware attribution is an important stage attack analysis because exploitation known vulnerabilities via execution one methods APT attackers use establish foothold target’s network. Prior attempts at automated behaviour report from sandboxes as inputs into machine learning algorithms. Whilst this good and reliable approach, it has some limitations. example, files may detect that they are sandboxed environment stop or behave differently leading false no attributions. Hence, there need for alternative feature extraction technique attribution. This research proposes novel framework lightweight uses fuzzy hashes natural language input classifiers attribute attacks. Experimental results show proposed attributes average accuracy F1-score 89% 87.5% country group classification. In addition, we demonstrate how approach provides faster method attribution, enhances advanced samples, generates competitive performance state-of-the-art dynamic engines.
منابع مشابه
DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks
In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons. Each nation-state has usually more than a single cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. Furtherm...
متن کاملActor-independent action search using spatiotemporal vocabulary with appearance hashing
Human actions in movies and sitcoms usually capture semantic cues for story understanding, which offer a novel search pattern beyond the traditional video search scenario. However, there are great challenges to achieve action-level video search, such as global motions, concurrent actions, and actor appearance variances. In this paper, we introduce a generalized action retrieval framework, which...
متن کاملSocial actor attribution to mobile phones: the case of tourists
This study examines social actor attribution to mobile phones in general settings and travel context. Informed by attribution theory and computing technology continuum of perspective model, the hypothesized relationships between social characteristics of mobile phones, users’ core selfevaluation, and social actor attribution to mobile phones were tested to determine the locus of causality of pe...
متن کاملThe actor-observer asymmetry in attribution: a (surprising) meta-analysis.
The actor-observer hypothesis (E. E. Jones & R. E. Nisbett, 1971) states that people tend to explain their own behavior with situation causes and other people's behavior with person causes. Widely known in psychology, this asymmetry has been described as robust, firmly established, and pervasive. However, a meta-analysis on 173 published studies revealed average effect sizes from d = -0.016 to ...
متن کاملThe Challenges Facing State-Nation-Building in Israel
Completing the nation-building process for survival is one of the challenges that the Zionist regime has always faced. This regime has based its existence on a specific and complex identity that, at first glance, can be a strong point for the survival and formation of a society, but the specific characteristics of this identity based on race and population inequality, for This has posed some ch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3233403