APT beaconing detection: A systematic review

被引:14
作者
Abu Talib, Manar [1 ]
Nasir, Qassim [2 ]
Nassif, Ali Bou [2 ]
Mokhamed, Takua [1 ]
Ahmed, Nafisa [1 ]
Mahfood, Bayan [1 ]
机构
[1] Univ Sharjah, Coll Comp & Informat, Dept Comp Sci, Sharjah, U Arab Emirates
[2] Univ Sharjah, Coll Comp & Informat, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
关键词
APT; Beaconing; Attack; Security breach; Detection; AI; C& ADVANCED PERSISTENT THREAT; INTRUSION DETECTION; MALWARE; DEFINITION; PREDICTION; INTERNET; EVENT; MODEL; GAME; LINE;
D O I
10.1016/j.cose.2022.102875
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention of researchers, partic-ularly in the industrial security field. APTs are cyber intrusions carried out by skilled and well-resourced adversaries who target specific information in high-profile organizations and governments, frequently as part of a multi-phase long-term operation. One of the phases of the APT process is the command-and -control (C&C) phase, also known as beaconing. Beaconing is an important part of an APT lifecycle, where the adversaries establish channels with the compromised hosts in the targeted system, allowing them to launch additional attacks. Detecting and predicting this stage is therefore a practical way to guard against APTs. This paper discusses the techniques and methods used to detect APTs and also specifically to identify beaconing, either during the APT lifecycle or not. In it, we determine various artificial intelli-gence algorithms used for detecting, analyzing and comparing characteristics of datasets and data sources used to implement these detection techniques. Moreover, we present the strengths and challenges of var-ious APT/beaconing detection methods. Finally, this study outlines many cybersecurity vendor projects that have been created to identify APT or beaconing operations, categorized according to the detection approach utilized.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:24
相关论文
共 157 条
  • [1] Advanced Persistent Threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm
    Abdullayeva, Fargana J.
    [J]. ARRAY, 2021, 10
  • [2] Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack
    Ahmad, Atif
    Webb, Jeb
    Desouza, Kevin C.
    Boorman, James
    [J]. COMPUTERS & SECURITY, 2019, 86 : 402 - 418
  • [3] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [4] [Anonymous], ABS151203385 CORR
  • [5] [Anonymous], 2012, ACM EUR WORKSH SYST
  • [6] [Anonymous], MACHINE LEARNING CYB
  • [7] Antonacopoulos Apostolos, 2009, 2009 10th International Conference on Document Analysis and Recognition (ICDAR), P296, DOI 10.1109/ICDAR.2009.271
  • [8] Apruzzese G, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P11
  • [9] Atapour C., 2018, J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl., V9, P71
  • [10] Baksi R.P., 2017, WORLD ACAD SCI ENG T, V10