Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

被引:12
作者
Lee, Kyungroul [1 ]
Lee, Jaehyuk [2 ]
Yim, Kangbin [3 ]
机构
[1] Mokpo Natl Univ, Dept Informat Secur, Mokpo 58554, South Korea
[2] Mokpo Natl Univ, Interdisciplinary Program Informat & Protect, Mokpo 58554, South Korea
[3] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
基金
新加坡国家研究基金会;
关键词
malicious code; detection technique; attack scenario; attack technique; APT attack; INTRUSION DETECTION SYSTEM; MALWARE DETECTION SYSTEM; ENTROPY; CHALLENGES; SELECTION;
D O I
10.3390/app13052894
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks. As APT attacks continue to be active, there is a need for countermeasures to detect new and existing malicious codes. An APT attack is a type of intelligent attack that analyzes the target and exploits its vulnerabilities. It attempts to achieve a specific purpose, and is persistent in continuously attacking and threatening the system. With this background, this paper analyzes attack scenarios based on attack cases by malicious code, and surveys and analyzes attack techniques used in attack cases. Based on the results of the analysis, we classify and analyze malicious code detection techniques into security management systems, pattern-based detection, heuristic-based detection, reputation-based detection, behavior-based detection, virtualization-based detection, anomaly detection, data analysis-based detection (big data-based, machine learning-based), and others. This paper is expected to serve as a useful reference for detecting and preventing malicious codes. Specifically, this article is a surveyed review article.
引用
收藏
页数:32
相关论文
共 131 条
[1]  
Agham V., 2016, INT RES J ENG TECHNO, V3, P32
[2]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[3]  
Ahmed Waqas., 2021, 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), P1, DOI 10.1109/NTMS49979.2021.9432677
[4]   Malware Analysis and Detection Using Machine Learning Algorithms [J].
Akhtar, Muhammad Shoaib ;
Feng, Tao .
SYMMETRY-BASEL, 2022, 14 (11)
[5]  
Al Daoud E., 2008, J OPEN PROBL COMPUT, V1, P29
[6]  
[Anonymous], 2011, Managing Information Security Risk: Organization, Mission, and Information System View
[7]   Permission-Based Malware Detection System for Android Using Machine Learning Techniques [J].
Arslan, Recep Sinan ;
Dogru, Ibrahim Alper ;
Barisci, Necaattin .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (01) :43-61
[8]  
Ashoor A.S., 2011, P INT C ADV MAT ENG, VVolume 15, P6
[9]   Ransomware detection using machine learning algorithms [J].
Bae, Seong Il ;
Lee, Gyu Bin ;
Im, Eul Gyu .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
[10]   Structural entropy and metamorphic malware [J].
Baysa, Donabelle ;
Low, Richard M. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (04) :179-192