AI Article Synopsis

  • Advanced Persistent Threat (APT) attacks targeting sensors are a growing security issue, allowing attackers to infiltrate and steal information over long periods due to weak sensor protection.
  • Analyzing Domain Name Server (DNS) traffic is a key method for detecting these attacks, but traditional data preprocessing methods struggle with the large volumes of DNS traffic, leading to inefficiencies.
  • To tackle this, the authors propose a sketch-based detection scheme that compresses network traffic and improves detection efficiency, achieving high accuracy of 97.9% and dramatically reducing processing time in their experiments.

Article Abstract

In recent years, Advanced Persistent Threat (APT) attacks against sensors have emerged as a prominent security concern. Due to the low level of protection provided by sensors, APT attack organizations are able to develop intrusion schemes that allow them to infiltrate, attack, lurk, spread, and steal information from the target over an extended period of time. Through extensive research on the APT attack process and current defense mechanisms, it has been found that analyzing Domain Name Server (DNS) traffic in the communication control phase is an effective way of detecting APT attacks. However, analyzing APT attacks based on traffic usually involves the detection of a vast amount of DNS traffic, and current data preprocessing methods do not scale down data effectively, leading to low detection efficiency. In previous work, most efforts have been focused on calculating the features of request messages or corresponding messages without considering the association between request messages and corresponding messages. To address these issues, we propose a sketch-based APT attack traffic detection scheme. The scheme leverages the sketch structure to count and compress network traffic, improving the efficiency of APT detection. Our work also analyzes the limitations of traditional sketches in network traffic and proposes an improved sketch scheme. In addition, we propose several effective features for detecting APT attacks. We validate and evaluate our solution using 1,088,280 DNS traffic from a lab network and APT suspicious traffic from netresec and contagio, using eight machine learning models. The experimental results show that for the ExtraTrees model, our solution has a processing time of 0.0638 s and an accuracy of 0.97920, reducing the processing time by approximately 50 times and improving detection accuracy by a small margin compared to a dataset without sketch processing.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9964868PMC
http://dx.doi.org/10.3390/s23042217DOI Listing

Publication Analysis

Top Keywords

apt attack
16
dns traffic
16
apt attacks
16
apt
10
traffic
9
detection scheme
8
detecting apt
8
request messages
8
messages corresponding
8
corresponding messages
8

Similar Publications

To enhance the effectiveness of the Advanced Persistent Threat (APT) detection process, this research proposes a new approach to build and analyze the behavior profiles of APT attacks in network traffic. To achieve this goal, this study carries out two main objectives, including (i) building the behavior profile of APT IP in network traffic using a new intelligent computation method; (ii) analyzing and evaluating the behavior profile of APT IP based on a deep graph network. Specifically, to build the behavior profile of APT IP, this article describes using a combination of two different data mining methods: Bidirectional Long Short-Term Memory (Bi) and Attention (A).

View Article and Find Full Text PDF

Background: Coffee (Coffea arabica L.) is one of the most important commodities today, with a high economic value worldwide. Coffee leaf rust (Hemileia vastatrix Berk.

View Article and Find Full Text PDF

Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024.

Data Brief

June 2024

Electrical and Computer Engineering Department, College of Engineering, Sultan Qaboos University, Al-Khud, 123 Muscat, Oman.

The novel dataset called Linux-APT Dataset 2024 captures Advanced Persistent Threat (APT) attacks along with other latest and sophisticated payloads. Existing datasets lacks latest attacker's techniques and procedures, APTs tactics and configuration to capture maximum Linux log sources to observe the working and behaviour of an APT in a detailed manner. The environment which supported us in capturing the logs is composed of Linux machines and a centralized logging system configured appropriately to captures and detect all possible events and logs for an APT and other complex intrusion.

View Article and Find Full Text PDF

Advanced Persistent Threat (APT) attacks are causing a lot of damage to critical organizations and institutions. Therefore, early detection and warning of APT attack campaigns are very necessary today. In this paper, we propose a new approach for APT attack detection based on the combination of Feature Intelligent Extraction (FIE) and Representation Learning (RL) techniques.

View Article and Find Full Text PDF

Background: Cervical artery dissection (CAD) is a relevant etiology of transient ischemic attacks and strokes. Several trials explored the significance of specific antithrombotic treatments, i.e.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!