2023
DOI: 10.1002/cpe.7865
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection

Neeraj Saini,
Vivekananda Bhat Kasaragod,
Krishna Prakasha
et al.

Abstract: SummaryA persistent, targeted cyber attack is called an advanced persistent threat (APT) attack. The attack is mainly launched to gain sensitive information, take over the system, and for financial gain, which creates nowadays more hurdles and challenges for the organization in preventing, detecting, and recovering from such attacks. Due to the nature of APT attacks, it is difficult to detect them quickly. Therefore machine learning techniques come into these research areas. This study uses deep and machine le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 46 publications
0
4
0
Order By: Relevance
“…This model aims to effectively identify anomalous behaviors in complex network data. In abnormal traffic detection, XGBoost applications address complex data challenges [6][7][8]. Kasongo et al [6] used the XGBoost algorithm to reduce the dimensionality of the feature space, which improves the performance of various Machine Learning (ML) models and addresses challenges such as highdimensional data spaces and dataset imbalance.…”
Section: Machine Learning-based Methodsmentioning
confidence: 99%
“…This model aims to effectively identify anomalous behaviors in complex network data. In abnormal traffic detection, XGBoost applications address complex data challenges [6][7][8]. Kasongo et al [6] used the XGBoost algorithm to reduce the dimensionality of the feature space, which improves the performance of various Machine Learning (ML) models and addresses challenges such as highdimensional data spaces and dataset imbalance.…”
Section: Machine Learning-based Methodsmentioning
confidence: 99%
“…Lu et al 12 Alotaibi et al 13 Patidar et al 14 Liu et al 15 Alghawazi et al 16 Saini et al 17 Sheth et al 18 Okesola et al 19 Labib et al 20 Marashdih et al 21 Mehta et al 22 Henry et al 23 Pruzinec et al 24 Irungu et al 25 Fratty et al 26 Logozzo et al 27 Singh et al 28 Crespo-Martínez et al 29 Fu et al 30 Philip et al 31 Barsellotti et al 32 Mallissery et al 33 Lu et al 12 Alotaibi et al 13 Guan et al 34 Nasrullayev et al 35 Muhammad et al 36 Brintha et al 37 Al Badri et al [36] Lu et al 12 (2023)…”
Section: Parse Tree Validation Policy Enforcement Isr Taint Tracking ...mentioning
confidence: 99%
“…Spatial analysis, on the other hand, has focused on the interaction patterns among various components within a system, offering insights into the propagation and impact of malware, and have demonstrated the potential to enhance situational awareness and provide a comprehensive understanding of the threat landscape [14]. In addition to these techniques, hybrid models combining behavioral analysis and anomaly detection have been proposed to leverage the strengths of both approaches [15]. By integrating multiple detection mechanisms, these hybrid models aim to improve detection accuracy and reduce false positives [16].…”
Section: Related Workmentioning
confidence: 99%