Attribution classification method of APT malware based on multi-feature fusion

Author:

Zhang JianORCID,Liu ShengquanORCID,Liu Zhihua

Abstract

In recent years, with the development of the Internet, the attribution classification of APT malware remains an important issue in society. Existing methods have yet to consider the DLL link library and hidden file address during the execution process, and there are shortcomings in capturing the local and global correlation of event behaviors. Compared to the structural features of binary code, opcode features reflect the runtime instructions and do not consider the issue of multiple reuse of local operation behaviors within the same APT organization. Obfuscation techniques more easily influence attribution classification based on single features. To address the above issues, (1) an event behavior graph based on API instructions and related operations is constructed to capture the execution traces on the host using the GNNs model. (2) ImageCNTM captures the local spatial correlation and continuous long-term dependency of opcode images. (3) The word frequency and behavior features are concatenated and fused, proposing a multi-feature, multi-input deep learning model. We collected a publicly available dataset of APT malware to evaluate our method. The attribution classification results of the model based on a single feature reached 89.24% and 91.91%. Finally, compared to single-feature classifiers, the multi-feature fusion model achieves better classification performance.

Funder

Major Science and Technology Projects in Xinjiang Uygur Autonomous Region

Science and Technology Program of Xinjiang

Publisher

Public Library of Science (PLoS)

Reference41 articles.

1. Hutchins EM, Cloppert MJ, Amin RM. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains; 2010. Available from: https://api.semanticscholar.org/CorpusID:6421896.

2. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities;A Alshamrani;IEEE Communications Surveys & Tutorials,2019

3. Ghafir I, Přenosil V. Advanced Persistent Threat Attack Detection: An Overview; 2014. Available from: https://api.semanticscholar.org/CorpusID:111334688.

4. Stuxnet, the real start of cyber warfare? [Editor’s Note];TM Chen;IEEE Network,2010

5. TagSeq: Malicious behavior discovery using dynamic analysis;YT Huang;PLOS ONE,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3