Advanced Persistent Threats Detection based on Deep Learning Approach

被引:7
作者
Eke, Hope Nkiruka [1 ]
Petrovski, Andrei [2 ]
机构
[1] Robert Gordon Univ, Sch Comp, Aberdeen, Scotland
[2] Natl Subsea Ctr, Sch Comp, Aberdeen, Scotland
来源
2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS | 2023年
关键词
Advanced Persistent Threats; Cyber-Physical Systems; Critical Infrastructures; Deep Learning; Industrial Control Systems; Supervisory Control and Data Acquisition; APT ATTACKS; NETWORKS;
D O I
10.1109/ICPS58381.2023.10128062
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach networks, often, over multiple network hosts and evades detection. It also uses "low-and-slow" approach over a long period of time. Resource availability, integrity, and confidentiality of the operational cyber-physical systems (CPS) state and control is highly impacted by the safety and security measures in place. A framework multi-stage detection approach termed "APT(DASAC)" to detect different tactics, techniques, and procedures (TTPs) used during various APT steps is proposed. Implementation was carried out in three stages: (i) Data input and probing layer - this involves data gathering and pre-processing, (ii) Data analysis layer; applies the core process of "APT(DASAC)" to learn the behaviour of attack steps from the sequence data, correlate and link the related output and, (iii) Decision layer; the ensemble probability approach is utilized to integrate the output and make attack prediction. The framework was validated with three different datasets and three case studies. The proposed approach achieved a significant attacks detection capability of 86.36% with loss as 0.32%, demonstrating that attack detection techniques applied that performed well in one domain may not yield the same good result in another domain. This suggests that robustness and resilience of operational systems state to withstand attack and maintain system performance are regulated by the safety and security measures in place, which is specific to the system in question.
引用
收藏
页数:10
相关论文
共 38 条
[1]  
A M, 2016, International Journal of Computer Applications, V141, P46, DOI [10.5120/ijca2016909784, 10.5120/ijca2016909784, DOI 10.5120/IJCA2016909784]
[2]  
Alperovitch D., 2011, REVEALED OPERATION S, V3, P2011
[3]  
Assante M.J., 2015, The Industrial Control System Cyber Kill Chain
[4]   A baseline for unsupervised advanced persistent threat detection in system-level provenance [J].
Berrada, Ghita ;
Cheney, James ;
Benabderrahmane, Sidahmed ;
Maxwell, William ;
Mookherjee, Himan ;
Theriault, Alec ;
Wright, Ryan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :401-413
[5]  
Brand M, 2010, J DIGIT FORENSICS SE, V5, P31
[6]   Domain adaptation for Windows advanced persistent threat detection [J].
Coulter, Rory ;
Zhang, Jun ;
Pan, Lei ;
Xiang, Yang .
COMPUTERS & SECURITY, 2022, 112
[7]   A Method of Monitoring and Detecting APT Attacks Based on Unknown Domains [J].
Do Xuan Cho ;
Ha Hai Nam .
PROCEEDINGS OF THE 13TH INTERNATIONAL SYMPOSIUM INTELLIGENT SYSTEMS 2018 (INTELS'18), 2019, 150 :316-323
[8]  
Eke Hope, 2020, International Journal of Systems and Software Security and Protection, V11, P13, DOI [10.4018/ijsssp.2020070102, 10.4018/IJSSSP.2020070102]
[9]  
Eke H., 2020, P 13 INT C SEC INF N, DOI [10.1145/3433174.3433615, DOI 10.1145/3433174.3433615]
[10]  
Eke H.N., 2016, STUDY WEB BASED COMM, P1