2022
DOI: 10.1007/s10489-021-03138-z
|View full text |Cite
|
Sign up to set email alerts
|

A new approach for APT malware detection based on deep graph network for endpoint systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…• APT malware often runs processes to hide detection during an attack. Collecting this data is essential for detecting abnormal behaviors [104].…”
Section: G Advanced Persistent Threats (Apts)mentioning
confidence: 99%
See 2 more Smart Citations
“…• APT malware often runs processes to hide detection during an attack. Collecting this data is essential for detecting abnormal behaviors [104].…”
Section: G Advanced Persistent Threats (Apts)mentioning
confidence: 99%
“…They used features such as network flow, traffic statistics, and temporal patterns. Other methods include semi-supervised learning with complex network characteristics [103], real-time provenance tracking [32], real-time APT detection using an ensemble learning approach [150], decepticon techniques [151], and deep graph networks [104] to detect APTs by leveraging packet-and network-level attributes, network flow data, traffic analyses, and graph-based features. Yang et al [33] developed a data backup and recovery strategy for the APTs.…”
Section: C: Advanced Persistent Threat (Apt) Detection Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, different from traditional approaches given above, image(visualization)‐based methods have been started to be researched and tested for malware and advanced persistent threat (APT) detection 19‐22 . The visualization approach, first the application files converts to images, extracts important features and then uses computer vision methods.…”
Section: Introductionmentioning
confidence: 99%
“…18 In recent years, different from traditional approaches given above, image(visualization)-based methods have been started to be researched and tested for malware and advanced persistent threat (APT) detection. [19][20][21][22] The visualization approach, first the application files converts to images, extracts important features and then uses computer vision methods. This methods reduce domain expertise, source codes are analyzed from a general perspective, and it is possible to provide image-based classification using convolutional neural networks (CNN).…”
mentioning
confidence: 99%