2021
DOI: 10.1155/2021/6653386
|View full text |Cite
|
Sign up to set email alerts
|

HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis

Abstract: APT malware exploits HTTP to establish communication with a C & C server to hide their malicious activities. Thus, HTTP-based APT malware infection can be discovered by analyzing HTTP traffic. Recent methods have been dependent on the extraction of statistical features from HTTP traffic, which is suitable for machine learning. However, the features they extract from the limited HTTP-based APT malware traffic dataset are too simple to detect APT malware with strong randomness insufficiently. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…To detect HTTP-based APT malware infection, [111] explored the usage of graph reasoning to build a web request graph using the referrer value in HTTP requests. They discovered that malware-related web access behaviors typically lack referrer values.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%
“…To detect HTTP-based APT malware infection, [111] explored the usage of graph reasoning to build a web request graph using the referrer value in HTTP requests. They discovered that malware-related web access behaviors typically lack referrer values.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%