Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

被引:10
|
作者
Lee, Kyungroul [1 ]
Lee, Jaehyuk [2 ]
Yim, Kangbin [3 ]
机构
[1] Mokpo Natl Univ, Dept Informat Secur, Mokpo 58554, South Korea
[2] Mokpo Natl Univ, Interdisciplinary Program Informat & Protect, Mokpo 58554, South Korea
[3] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
基金
新加坡国家研究基金会;
关键词
malicious code; detection technique; attack scenario; attack technique; APT attack; INTRUSION DETECTION SYSTEM; MALWARE DETECTION SYSTEM; ENTROPY; CHALLENGES; SELECTION;
D O I
10.3390/app13052894
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks. As APT attacks continue to be active, there is a need for countermeasures to detect new and existing malicious codes. An APT attack is a type of intelligent attack that analyzes the target and exploits its vulnerabilities. It attempts to achieve a specific purpose, and is persistent in continuously attacking and threatening the system. With this background, this paper analyzes attack scenarios based on attack cases by malicious code, and surveys and analyzes attack techniques used in attack cases. Based on the results of the analysis, we classify and analyze malicious code detection techniques into security management systems, pattern-based detection, heuristic-based detection, reputation-based detection, behavior-based detection, virtualization-based detection, anomaly detection, data analysis-based detection (big data-based, machine learning-based), and others. This paper is expected to serve as a useful reference for detecting and preventing malicious codes. Specifically, this article is a surveyed review article.
引用
收藏
页数:32
相关论文
共 50 条
  • [31] APT Attack Detection Based on Graph Convolutional Neural Networks
    Weiwu Ren
    Xintong Song
    Yu Hong
    Ying Lei
    Jinyu Yao
    Yazhou Du
    Wenjuan Li
    International Journal of Computational Intelligence Systems, 16
  • [32] Obfuscated Malicious Java']Javascript Detection using Classification Techniques
    Likarish, Peter
    Jung, Eunjin E. J.
    Jo, Insoon
    2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 47 - +
  • [33] Survey of attack and detection based on the full life cycle of APT
    Wang, Zhiwei
    He, Xijie
    Yi, Xin
    Li, Ziyang
    Cao, Xudong
    Yin, Tao
    Li, Shuhao
    Fu, Anmin
    Zhang, Yuqing
    Tongxin Xuebao/Journal on Communications, 2024, 45 (09): : 206 - 228
  • [34] Obfuscated malicious code detection with path condition analysis
    Fan, Wenqing
    Lei, Xue
    An, Jing
    Journal of Networks, 2014, 9 (05) : 1208 - 1214
  • [35] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [36] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [37] Malicious Code Detection Model Based on Behavior Association
    Lansheng Han
    Mengxiao Qian
    Xingbo Xu
    Cai Fu
    Hamza Kwisaba
    Tsinghua Science and Technology, 2014, 19 (05) : 508 - 515
  • [38] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [39] Visualization Feature and CNN Based Homology Classification of Malicious Code
    CHU Qianfeng
    LIU Gongshen
    ZHU Xinyu
    Chinese Journal of Electronics, 2020, 29 (01) : 154 - 160
  • [40] Lightweight Malicious Code Classification Method Based on Improved SqueezeNet
    Li, Li
    Kong, Youran
    Zhang, Qing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 551 - 567