Attribution classification method of APT malware based on multi-feature fusion

被引:4
作者
Zhang, Jian [1 ]
Liu, Shengquan [1 ]
Liu, Zhihua [1 ]
机构
[1] Xinjiang Univ, Sch Comp Sci & Technol, Urumqi, Xinjiang Uygur, Peoples R China
关键词
PROPAGATION;
D O I
10.1371/journal.pone.0304066
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In recent years, with the development of the Internet, the attribution classification of APT malware remains an important issue in society. Existing methods have yet to consider the DLL link library and hidden file address during the execution process, and there are shortcomings in capturing the local and global correlation of event behaviors. Compared to the structural features of binary code, opcode features reflect the runtime instructions and do not consider the issue of multiple reuse of local operation behaviors within the same APT organization. Obfuscation techniques more easily influence attribution classification based on single features. To address the above issues, (1) an event behavior graph based on API instructions and related operations is constructed to capture the execution traces on the host using the GNNs model. (2) ImageCNTM captures the local spatial correlation and continuous long-term dependency of opcode images. (3) The word frequency and behavior features are concatenated and fused, proposing a multi-feature, multi-input deep learning model. We collected a publicly available dataset of APT malware to evaluate our method. The attribution classification results of the model based on a single feature reached 89.24% and 91.91%. Finally, compared to single-feature classifiers, the multi-feature fusion model achieves better classification performance.
引用
收藏
页数:28
相关论文
共 41 条
[1]   A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities [J].
Alshamrani, Adel ;
Myneni, Sowmya ;
Chowdhary, Ankur ;
Huang, Dijiang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1851-1877
[2]   Opcodes as predictor for malware [J].
Bilar, Daniel .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) :156-168
[3]   APT malware static trace analysis through bigrams and graph edit distance [J].
Bolton, Alexander D. ;
Anderson-Cook, Christine M. .
STATISTICAL ANALYSIS AND DATA MINING, 2017, 10 (03) :182-193
[4]   Similarity encoding for learning with dirty categorical variables [J].
Cerda, Patricio ;
Varoquaux, Gael ;
Kegl, Balazs .
MACHINE LEARNING, 2018, 107 (8-10) :1477-1494
[5]   Stuxnet, the Real Start of Cyber Warfare? [J].
Chen, Thomas M. .
IEEE NETWORK, 2010, 24 (06) :2-3
[6]   Advanced persistent threat organization identification based on software gene of malware [J].
Chen, Weixiang ;
Helu, Xiaohan ;
Jin, Chengjie ;
Zhang, Man ;
Lu, Hui ;
Sun, Yanbin ;
Tian, Zhihong .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12)
[7]   A new approach for APT malware detection based on deep graph network for endpoint systems [J].
Cho Do Xuan ;
Huong, D. T. .
APPLIED INTELLIGENCE, 2022, 52 (12) :14005-14024
[8]   Android Malware Detection Method Based on CNN and DNN Bybrid Mechanism [J].
Dong, Shi ;
Shu, Longhui ;
Nie, Shan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) :7744-7753
[9]  
Ghafir I, 2014, Advanced Persistent Threat Attack Detection: An Overview
[10]   HYDRA: A multimodal deep learning framework for malware classification [J].
Gibert, Daniel ;
Mateu, Carles ;
Planes, Jordi .
COMPUTERS & SECURITY, 2020, 95