Detection of advanced persistent threat: A genetic programming approach

被引:0
作者
Al Mamun, Abdullah [1 ]
Al-Sahaf, Harith [1 ,2 ]
Welch, Ian [1 ]
Mansoori, Masood [1 ]
Camtepe, Seyit [3 ]
机构
[1] Victoria Univ Wellington, Sch Engn & Comp Sci, Wellington, New Zealand
[2] Al Zahraa Univ Women, Coll Informat Technol Engn, Karbala, Iraq
[3] CSIRO, Data61, Eveleigh, Australia
关键词
APT; Advanced Persistent Threat; Evolutionary computation; Genetic Programming; Machine Learning; CKC; INTRUSION DETECTION; ANOMALY DETECTION; NETWORKS; SYSTEM;
D O I
10.1016/j.asoc.2024.112447
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced Persistent Threats (APTs) are an intimidating class of cyberattacks known for their persistence, sophistication, and targeted nature. These attacks, coordinated by highly motivated adversaries, pose a grave risk to organizations and individuals, often operating stealthily and evading detection. While existing research primarily focuses on applying Machine Learning (ML) methods to analyze network traffic data for APT detection, this article introduces a novel approach that utilizes Genetic Programming (GP). The proposed method not only detects APT attacks but also identifies their specific life cycle stages through the evolutionary capabilities of GP. Its effectiveness lies in its ability to excel in detecting intricate patterns, even within classes with a limited number of instances, a feat that is often challenging for traditional ML techniques. The method involves evolving and optimizing its models to effectively learn and adapt to complex APT behaviors. Experimentation with a publicly available dataset showcases the efficacy of the proposed method across diverse APT stages. The results demonstrate that the proposed method, GPC, achieves a 3.71% improvement in balanced accuracy compared to the best-performing model from related works. Moreover, a thorough analysis of the best-evolved GP model uncovers valuable insights about identified features and significant patterns. This research advances the APT detection paradigm by leveraging GP's capabilities, providing afresh and effective perspective on countering these persistent threats.
引用
收藏
页数:14
相关论文
共 72 条
  • [1] Automated Behavior-based Malice Scoring of Ransomware Using Genetic Programming
    Abbasi, Muhammad Shabbir
    Al-Sahaf, Harith
    Welch, Ian
    [J]. 2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [2] APT beaconing detection: A systematic review
    Abu Talib, Manar
    Nasir, Qassim
    Nassif, Ali Bou
    Mokhamed, Takua
    Ahmed, Nafisa
    Mahfood, Bayan
    [J]. COMPUTERS & SECURITY, 2022, 122
  • [3] A Survey of Genetic Programming and Its Applications
    Ahvanooey, Milad Taleby
    Li, Qianmu
    Wu, Ming
    Wang, Shuo
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (04) : 1765 - 1794
  • [4] Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction
    Al Mamun, Abdullah
    Al-Sahaf, Harith
    Welch, Ian
    Camtepe, Seyit
    [J]. COMPUTERS & SECURITY, 2025, 149
  • [5] Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach
    Al Mamun, Abdullah
    Al-Sahaf, Harith
    Welch, Ian
    Camtepe, Seyit
    [J]. 2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2022, : 42 - 49
  • [6] A Genetic Programming Approach to Feature Selection and Construction for Ransomware, Phishing and Spam Detection
    Al-Sahaf, Harith
    Welch, Ian
    [J]. PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 332 - 333
  • [7] Alminshid K., 2020, IRAQ J SCI, V61, P215
  • [8] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [9] Andropov S, 2017, PROC CONF OPEN INNOV, P26, DOI 10.23919/FRUCT.2017.8071288
  • [10] [Anonymous], 2014, Int. J. Appl. Eng. Res.