Machine Learning for APT Detection

Author:

AL-Aamri Abdullah Said1,Abdulghafor Rawad12,Turaev Sherzod3ORCID,Al-Shaikhli Imad1,Zeki Akram1,Talib Shuhaili1

Affiliation:

1. Department of Computer Science, Faculty of Information and Communication Technology, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia

2. Faculty of Computer Studies (FCS), Arab Open University-Oman, Muscat P.O. Box 1596, Oman

3. Department of Computer Science and Software Engineering, College of Information Technology, United Arab Emirates University, Al Ain 15551, United Arab Emirates

Abstract

Nowadays, countries face a multitude of electronic threats that have permeated almost all business sectors, be it private corporations or public institutions. Among these threats, advanced persistent threats (APTs) stand out as a well-known example. APTs are highly sophisticated and stealthy computer network attacks meticulously designed to gain unauthorized access and persist undetected threats within targeted networks for extended periods. They represent a formidable cybersecurity challenge for governments, corporations, and individuals alike. Recognizing the gravity of APTs as one of the most critical cybersecurity threats, this study aims to reach a deeper understanding of their nature and propose a multi-stage framework for automated APT detection leveraging time series data. Unlike previous models, the proposed approach has the capability to detect real-time attacks based on stored attack scenarios. This study conducts an extensive review of existing research, identifying its strengths, weaknesses, and opportunities for improvement. Furthermore, standardized techniques have been enhanced to enhance their effectiveness in detecting APT attacks. The learning process relies on datasets sourced from various channels, including journal logs, traceability audits, and systems monitoring statistics. Subsequently, an efficient APT detection and prevention system, known as the composition-based decision tree (CDT), has been developed to operate in complex environments. The obtained results demonstrate that the proposed approach consistently outperforms existing algorithms in terms of detection accuracy and effectiveess.

Publisher

MDPI AG

Subject

Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction

Reference40 articles.

1. Dive into Deep Learning;Czum;J. Am. Coll. Radiol.,2020

2. Ahmad, W., Rasool, A., Javed, A.R., Baker, T., and Jalil, Z. (2022). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics, 11.

3. Groenendaal, J., Helsloot, I., and Reuter, C. (2022, January 22–25). Towards More Insight into Cyber Incident Response Decision Making and its Implications for Cyber Crisis Management. Proceedings of the ISCRAM 2022 Conference Proceedings–19th International Conference on Information Systems for Crisis Response and Management, Tarbes, France.

4. Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units;Bajao;Mesopotamian J. Cybersecur.,2023

5. The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment;Mijwil;Mesopotamian J. Cybersecur.,2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3