...
首页> 外文期刊>Computer networks >Discovering unknown advanced persistent threat using shared features mined by neural networks
【24h】

Discovering unknown advanced persistent threat using shared features mined by neural networks

机译:使用神经网络开采的共享功能发现未知的高级持久威胁

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Command and control channel(C&C) is used in some cyber attacks to remotely control infected hosts to steal data or conduct espionage. An effective type of C&C detection methods is network flow based. The insight is that network flow is evitable because the hidden malware in the target system has to communicate with the external C&C server to either receive commands or send data. However, existing network flow-based methods face two challenges to efficiently detect C&C of APT(Advanced persistent threat) attacks, i.e., stealth and flexible attack techniques. To combat these two challenges, we design a new network flow-based C&C detection method. Our work is inspired from two observations that different APT attacks share the same intrusion tools and services, and the unknown malware evolves from existing one. Therefore, the malwares of different groups have some shared attributes that are not easy to find, which leads to some hidden shared features in the network flows between the malware and the C&C server in different attacks. Based on this, we propose a method to detect the hidden C&C channel of unknown APT attacks. First, we use deep learning techniques to mine the shared network flow features from the known multi-class attack flows. Later, we use an appropriate classifier to detect the C&C network flow . Finally, we test our method on public available dataset. The experimental results show that our method can achieve up to F1 score of 0.968 when dealing with unknown malicious network flows. This will help discover unknown APT attacks.
机译:命令和控制信道(C&C)用于一些网络攻击,以远程控制受感染的主机窃取数据或进行间谍活动。有效类型的C&C检测方法是基于网络流的。洞察力是网络流是可恶的,因为目标系统中的隐藏恶意软件必须与外部C&C服务器通信,以接收命令或发送数据。然而,现有的基于网络流的方法面临两个挑战,以有效地检测APT(高级持久威胁)攻击的C&C,即隐形和灵活的攻击技巧。要打击这两个挑战,我们设计了一种新的基于网络流的C&C检测方法。我们的工作受到两种观察的启发,即不同的APT攻击份额份额相同的入侵工具和服务,并且未知的恶意软件从现有的攻击中发展。因此,不同组的恶意具有一些不容易找到的共享属性,这导致在不同攻击中的恶意软件和C&C服务器之间的网络流中的某些隐藏共享功能。基于此,我们提出了一种方法来检测未知APT攻击的隐藏C&C信道。首先,我们使用深度学习技术来挖掘来自已知的多级攻击流的共享网络流特征。稍后,我们使用适当的分类器来检测C&C网络流程。最后,我们在公共可用数据集上测试我们的方法。实验结果表明,当处理未知的恶意网络流量时,我们的方法可以在0.968达到0.968的F1得分。这将有助于发现未知的APT攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号