2020
DOI: 10.1109/access.2020.3012907
|View full text |Cite
|
Sign up to set email alerts
|

MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution

Abstract: The rise of emerging cyberthreats has led to a shift of focus on identifying the source of threat instead of the type of attack to provide a more effective defense to compromised environments against malicious acts. The most complex type of cyberthreat is the Advanced Persistent Threat (APT) attack that is usually backed by one or more states and lunched using a range of clandestine techniques aiming at high-value targets. Finding the source of the attackers and the associated campaign behind the threats can l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(7 citation statements)
references
References 26 publications
1
6
0
Order By: Relevance
“…This concurs with the rest of the field [50,22,58,77,44]. Seven papers consider three alternative ML methods: clustering, anomaly detection and structured prediction techniques [106,66,80,78,7,8,47]. We explore these further as they show promise towards the open-world problem.…”
Section: Data Modeling Techniquessupporting
confidence: 69%
See 3 more Smart Citations
“…This concurs with the rest of the field [50,22,58,77,44]. Seven papers consider three alternative ML methods: clustering, anomaly detection and structured prediction techniques [106,66,80,78,7,8,47]. We explore these further as they show promise towards the open-world problem.…”
Section: Data Modeling Techniquessupporting
confidence: 69%
“…Alrabaee et al [7,8] use convolutional neural networks to cluster author style and then use a classifier to determine if a piece of malware belongs to an author cluster. Finally, Haddadpajouh et al [47] choose a multi-view fuzzy clustering model to group malware into APT groups based on identifying loosely defined patterns among binary artifacts.…”
Section: Data Modeling Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Even encrypted data may be accessed by intruders. An adversary's principal purpose is to get victim-specific personal data [6].…”
Section: Privacy and Securitymentioning
confidence: 99%