2020
DOI: 10.1002/ett.3884
|View full text |Cite
|
Sign up to set email alerts
|

Advanced persistent threat organization identification based on software gene of malware

Abstract: Since the concept of IoT (Internet of Things) was proposed, it has digitized the real world and has a wide range of applications. However, with tremendous evolution in data acquisition and transfer, a new type of attack represented by advanced persistent threat (APT) has attracted wide attention. APT organization identification for malware is a method to detect APT attacks. However, most of malware is tailored to the goal, it is complex and changeable, or can be updated very quickly. The traditional analysis m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Static analysis is a form of code analysis method that receives a software package's origin code or binary code as input [ 138 ] and then inspects the code without running the software package to ensure its security and reliability. When compared to dynamic analysis, static analysis does not need to execute the application, so it is efficient and fast.…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
“…Static analysis is a form of code analysis method that receives a software package's origin code or binary code as input [ 138 ] and then inspects the code without running the software package to ensure its security and reliability. When compared to dynamic analysis, static analysis does not need to execute the application, so it is efficient and fast.…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
“…ey trained each isolation forest with specific APT samples using only static features. To solve the problem of malware APT organization identification, Chen et al [4] designed a gene model combined with the knowledge graph of malware behavior. ey proposed a genetic similarity algorithm for malware APT organization identification and revealed the possibility of using genes to trace malware.…”
Section: Related Workmentioning
confidence: 99%
“…However, unlike traditional network attacks, APT attacks will use some independent development malware to achieve specific purposes against different targets [3]. is malware is collectively called APT malware [4]. APT malware is one kind of advanced malware tailored for special targets, which has posed even more serious threats than the traditional malware [2].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, in 2016, hackers launched DDOS attacks by manipulating IoT devices infected with malware known as Mirai. Behind APT attacks, there are usually organizations with government background or intelligence institutional background that provide funding with political or economic purpose [5]; the threat to national and enterprise information security systems is becoming more and more serious, and the number of APT reports is increasing year by year. Security agencies of various countries have disclosed hundreds of APT organizations, commonly active ones being Russia's APT28 and APT29, North Korea's Lazarus, and so on.…”
Section: Introductionmentioning
confidence: 99%
“…e dynamic feature extraction is used to monitor the behavior of the program when it is running and then extract the dynamic behavior characteristics of the code such as API operations, file system operations, function access, and system calls. For example, Chen et al [5] proposed a new genetic model combined with a knowledge map of malware behavior.…”
Section: Introductionmentioning
confidence: 99%