2021
DOI: 10.1155/2021/9396141
|View full text |Cite
|
Sign up to set email alerts
|

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques

Abstract: In recent years, the popularity of IoT (Internet of Things) applications and services has brought great convenience to people's lives, but ubiquitous IoT has also brought many security problems. Among them, advanced persistent threat (APT) is one of the most representative attacks, and its continuous outbreak has brought unprecedented security challenges for the large-scale deployment of the IoT. However, important research on analyzing the attribution of APT malware samples is still relatively few. Therefore,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
33
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(39 citation statements)
references
References 23 publications
0
33
0
Order By: Relevance
“…Next, we will present the findings and analysis of the research questions. Watering hole [3,28,79,84,88,99,101,102] Malware [1,3,88,89,[102][103][104][105] Application repackaging [106] Attacks on an Internet-facing server [3,83,89,101] Removable device [3,89,107] Drive-by download [96] Spoofing attack [7,82,108] SQL injection Execution [3,5,82,84,[86][87][88]90,94,97,101,[109][110][111][112][113][114] Zero day, known vulnerability [79,101,115] Remote code execution/Code injection ...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Next, we will present the findings and analysis of the research questions. Watering hole [3,28,79,84,88,99,101,102] Malware [1,3,88,89,[102][103][104][105] Application repackaging [106] Attacks on an Internet-facing server [3,83,89,101] Removable device [3,89,107] Drive-by download [96] Spoofing attack [7,82,108] SQL injection Execution [3,5,82,84,[86][87][88]90,94,97,101,[109][110][111][112][113][114] Zero day, known vulnerability [79,101,115] Remote code execution/Code injection ...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
“…Zero-day exploit-This attack takes advantage of an undiscovered software vulnerability for which no updates or fixes are available [3,5,82,84,[86][87][88]90,94,97,101,[109][110][111][112][113][114]; 2.…”
Section: Executionmentioning
confidence: 99%
See 2 more Smart Citations
“…It provides a new idea for the study of abnormal warning of virtual cryptocurrency.Virtual cryptocurrency anomaly detection and early-warning star-moon value model is shown in Figure2. Based on current research results at home and abroad[27][28][29], this model organically combines the definition, research, and early warning of virtual cryptocurrency anomalies into an overall model.…”
mentioning
confidence: 99%