2021
DOI: 10.1155/2021/8077220
|View full text |Cite
|
Sign up to set email alerts
|

Toward Identifying APT Malware through API System Calls

Abstract: Self-developed malware was usually used by advanced persistent threat (APT) attackers to launch APT attacks. Therefore, we can enhance the understanding and cognition of APT attacks by comprehending the behavior of APT malware. Unfortunately, the current research cannot effectively explain the relationship between the recognition, detection, and defense of APT. The model of similar studies also lacks an explanation about it. To defend against APT attacks and inquire about the similarity of different APT attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…In terms of machine learning and deep learning applications, Ishai R et al [10] traced APT organizations using deep neural networks (DNN). Wei C et al [11] extracted API system calls as features and employed a dynamic LSTM algorithm with attention mechanism to classify these APT malware organizations. Chen Y et al [12] extracted PE static features and applied deep forests and convolutional neural networks to identify APT malware organizations.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of machine learning and deep learning applications, Ishai R et al [10] traced APT organizations using deep neural networks (DNN). Wei C et al [11] extracted API system calls as features and employed a dynamic LSTM algorithm with attention mechanism to classify these APT malware organizations. Chen Y et al [12] extracted PE static features and applied deep forests and convolutional neural networks to identify APT malware organizations.…”
Section: Related Workmentioning
confidence: 99%
“…In [12], researchers developed a traceability system, from the perspective of the calling relationship between hosts and processes, to detect anomalies by monitoring the calling relationship. Some provenance tracking systems are proposed to monitor and analyse the activities of the system [13][14][15][16]. However, the long time interval and low-profile characteristics of complex behaviours of APT kind of unknown attacks make them still face the low detecting success rate problem.…”
Section: Related Workmentioning
confidence: 99%
“…These kinds of attacks are the most damaging and worrying type of attack because they are difficult to detect and are continuously attempted [4][5][6][7][8]. These attacks come through the vulnerable system in the network, and even if the system containing important assets is primarily protected from the attacker, the system cannot be protected if it is accessible through the vulnerable system inside the network [4][5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, in particular, as the Internet of Things (IoT) has been widely used, more and more vulnerable systems have proliferated inside the network [9][10][11][12][13]. As the risk of cyberattacks increases, companies and institutions are introducing various security systems to protect information assets, and are making efforts to maintain a safe network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation