首页> 外文学位 >Detecting targeted malicious email through supervised classification of persistent threat and recipient oriented features.
【24h】

Detecting targeted malicious email through supervised classification of persistent threat and recipient oriented features.

机译:通过对持久性威胁和面向收件人的功能进行监督分类来检测目标恶意电子邮件。

获取原文
获取原文并翻译 | 示例

摘要

Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive information from targeted networks. These targeted email attacks are not singular unrelated events, instead they are coordinated and persistent attack campaigns that can span years. This dissertation surveys and categorizes existing email filtering techniques, proposes and implements new methods for detecting targeted malicious email and compares these newly developed techniques to traditional detection methods. Current research and commercial methods for detecting illegitimate email are limited to addressing Internet scale email abuse, such as spam, but not focused on addressing targeted malicious emails. Furthermore, conventional tools such as anti-virus are vulnerability focused examining only the binary code of an email but ignoring all relevant contextual metadata.;This study first documents the existence of TME and characterizes it as a form of malicious email attack different than spam, phishing and other conventional illegitimate email. The quantitative research is conducted by analyzing email data from a large Fortune 500 company that has been subjected to these targeted emails. Persistent threat features, such as threat actor locale and weaponization tools, along with recipient oriented features, such as reputation and role, are leveraged with supervised data classification algorithms to demonstrate new techniques for detection of targeted malicious email. The specific tools, techniques, procedures, and infrastructure that a threat actor uses characterize the level and capability of a threat; the recipient's role and repeated targeting speak to the intent of the threat. Both sets of features are used in a random forest classifier to separate targeted malicious email from non-targeted malicious email. Performance of this data classifier is measured and compared to conventional email filtering techniques to demonstrate the added benefit of including these features. Performance evaluations are focused on false negative reduction since the cost of missing a targeted malicious email is far greater than the cost of mistakenly flagging a legitimate email as malicious.;Several findings are made in this study. First, targeted malicious email demonstrates association to persistent threat features as compared to non-targeted malicious email that does not. Second, targeted malicious email demonstrates association to recipient oriented features as compared to non-targeted malicious email that does not. Finally, detection of targeted malicious email using persistent threat and recipient oriented features results in significantly fewer false negatives than detection of targeted malicious email using conventional email filtering techniques. This improvement in false negative rates comes with acceptable false positive rates.;Future research can expand upon the features introduced in this study. For example, additional persistent threat features can be harvested from file level metadata (e.g. author names, document path locations) and additional recipient oriented features can be incorporated from organization databases. In this study, a binary outcome is defined: emails are either targeted malicious or non-targeted malicious. Future work can explore multi-class outcomes that pair specific threat actor campaigns and targeted recipients.
机译:近年来,针对电子邮件攻击以实现计算机网络利用已变得越来越普遍,更加隐蔽,并且记录越来越广泛。除了旨在诱骗用户泄露个人信息的令人讨厌的垃圾邮件或网络钓鱼之外,针对性的恶意电子邮件(TME)还有助于计算机网络的利用以及从目标网络中收集敏感信息。这些有针对性的电子邮件攻击不是单一的无关事件,而是经过协调和持续的攻击活动,可能会持续数年。本文对现有的电子邮件过滤技术进行了调查和分类,提出并实现了用于检测目标恶意电子邮件的新方法,并将这些新开发的技术与传统的检测方法进行了比较。当前用于检测非法电子邮件的研究和商业方法仅限于解决Internet范围的电子邮件滥用(例如垃圾邮件),但不专注于解决目标恶意电子邮件。此外,传统的工具(如防病毒工具)以漏洞为中心,仅检查电子邮件的二进制代码,却忽略了所有相关的上下文元数据。该研究首先记录了TME的存在,并将其表征为不同于垃圾邮件的一种恶意电子邮件攻击形式,网络钓鱼和其他常规的非法电子邮件。定量研究是通过分析来自一家财富500强公司的电子邮件数据进行的,这些公司已经受到这些目标电子邮件的影响。持久威胁功能(例如威胁参与者的语言环境和武器化工具)以及面向收件人的特征(例如信誉和角色)与监督数据分类算法一起使用,以展示用于检测目标恶意电子邮件的新技术。威胁行为者使用的特定工具,技术,程序和基础结构描述了威胁的级别和能力。收件人的角色和反复的针对性说明了威胁的意图。在随机森林分类器中都使用了这两组功能,以将目标恶意电子邮件与非目标恶意电子邮件分开。测量此数据分类器的性能,并将其与常规电子邮件过滤技术进行比较,以证明包括这些功能的附加好处。性能评估的重点是减少误报,因为丢失目标恶意电子邮件的损失远远大于错误地将合法电子邮件标记为恶意邮件的损失。首先,与非目标恶意电子邮件相比,目标恶意电子邮件展示了与持久威胁功能的关联。其次,与未定向的恶意电子邮件相比,定向的恶意电子邮件展示了与面向收件人的功能的关联。最后,与使用常规电子邮件过滤技术检测目标恶意电子邮件相比,使用持久性威胁和面向收件人的功能检测目标恶意电子邮件导致的误报大大减少。假阴性率的提高与可接受的假阳性率有关。未来的研究可以扩展本研究中介绍的功能。例如,可以从文件级元数据(例如作者姓名,文档路径位置)中获取其他持久性威胁功能,并且可以从组织数据库中合并其他面向收件人的功能。在这项研究中,定义了二进制结果:电子邮件是针对性的恶意软件还是非针对性的恶意软件。未来的工作可以探索将特定威胁参与者活动与目标接收者配对的多类结果。

著录项

  • 作者

    Amin, Rohan Mahesh.;

  • 作者单位

    The George Washington University.;

  • 授予单位 The George Washington University.;
  • 学科 Statistics.;Information Technology.;Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 180 p.
  • 总页数 180
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:37:12

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号