Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

被引:12
作者
Lee, Kyungroul [1 ]
Lee, Jaehyuk [2 ]
Yim, Kangbin [3 ]
机构
[1] Mokpo Natl Univ, Dept Informat Secur, Mokpo 58554, South Korea
[2] Mokpo Natl Univ, Interdisciplinary Program Informat & Protect, Mokpo 58554, South Korea
[3] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
基金
新加坡国家研究基金会;
关键词
malicious code; detection technique; attack scenario; attack technique; APT attack; INTRUSION DETECTION SYSTEM; MALWARE DETECTION SYSTEM; ENTROPY; CHALLENGES; SELECTION;
D O I
10.3390/app13052894
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks. As APT attacks continue to be active, there is a need for countermeasures to detect new and existing malicious codes. An APT attack is a type of intelligent attack that analyzes the target and exploits its vulnerabilities. It attempts to achieve a specific purpose, and is persistent in continuously attacking and threatening the system. With this background, this paper analyzes attack scenarios based on attack cases by malicious code, and surveys and analyzes attack techniques used in attack cases. Based on the results of the analysis, we classify and analyze malicious code detection techniques into security management systems, pattern-based detection, heuristic-based detection, reputation-based detection, behavior-based detection, virtualization-based detection, anomaly detection, data analysis-based detection (big data-based, machine learning-based), and others. This paper is expected to serve as a useful reference for detecting and preventing malicious codes. Specifically, this article is a surveyed review article.
引用
收藏
页数:32
相关论文
共 131 条
[21]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (01) :1-12
[22]   Differential area analysis for ransomware attack detection within mixed file datasets [J].
Davies, Simon R. ;
Macfarlane, Richard ;
Buchanan, William J. .
COMPUTERS & SECURITY, 2021, 108
[23]  
DeBarr D, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P67, DOI 10.1109/ISI.2013.6578788
[24]  
Devi B. Thirumaleshwari, 2020, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). Proceedings, P722, DOI 10.1109/ICIMIA48430.2020.9074924
[25]  
Dewan P, 2014, PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), DOI 10.1109/ECRIME.2014.6963160
[26]   Malware target recognition via static heuristics [J].
Dube, T. ;
Raines, R. ;
Peterson, G. ;
Bauer, K. ;
Grimaila, M. ;
Rogers, S. .
COMPUTERS & SECURITY, 2012, 31 (01) :137-147
[27]   Mitigating Drive-By Download Attacks: Challenges and Open Problems [J].
Egele, Manuel ;
Kirda, Engin ;
Kruegel, Christopher .
INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 :52-+
[28]   A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning [J].
El Kamel, Nadiya ;
Eddabbah, Mohamed ;
Lmoumen, Youssef ;
Touahni, Raja .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[29]  
Esfahani Alireza, 2019, Broadband Communications, Networks, and Systems. 9th International EAI Conference, Broadnets 2018. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 263), P159, DOI 10.1007/978-3-030-05195-2_16
[30]   HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection [J].
Eskandari, Mojtaba ;
Khorshidpour, Zeinab ;
Hashemi, Sattar .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02) :77-93