2022
DOI: 10.3390/app12136816
|View full text |Cite
|
Sign up to set email alerts
|

APT-Attack Detection Based on Multi-Stage Autoencoders

Abstract: In the face of emerging technological achievements, cyber security remains a significant issue. Despite the new possibilities that arise with such development, these do not come without a drawback. Attackers make use of the new possibilities to take advantage of possible security defects in new systems. Advanced-persistent-threat (APT) attacks represent sophisticated attacks that are executed in multiple steps. In particular, network systems represent a common target for APT attacks where known or yet undiscov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…For attack detection systems and security status monitoring systems, observable data is the key information to discover attacks, which includes measurement indicators, such as CPU utilization, disk usage, the rate of network traffic transmission, and also includes the network data flow, system logs, the application information, process information and so on. In order to maintain the covertness, the attacker will minimize the difference from the normal phase of the target system on the basis of achieving the target in the attack phase [10]. This difference and the change of the system represent the covertness of the attack phase.…”
Section: The Evaluation Methods For the Single-phase Of Apt Attackmentioning
confidence: 99%
“…For attack detection systems and security status monitoring systems, observable data is the key information to discover attacks, which includes measurement indicators, such as CPU utilization, disk usage, the rate of network traffic transmission, and also includes the network data flow, system logs, the application information, process information and so on. In order to maintain the covertness, the attacker will minimize the difference from the normal phase of the target system on the basis of achieving the target in the attack phase [10]. This difference and the change of the system represent the covertness of the attack phase.…”
Section: The Evaluation Methods For the Single-phase Of Apt Attackmentioning
confidence: 99%
“…Thus, a comparison with SOTA approaches as a baseline is obligatory, e. g., comparisons with other AI/ML-based approaches and/or signature-based IDS, such as Suricata 3 or Snort 4 . Up-todate approaches should also discuss early detection, zeroday attacks, and multi-stage attacks, as these are increasingly problematic to detect [30]. This hypothesis is important for Maggie Manager, as she is the one that wants to buy and include an AI/ML tool.…”
Section: H15: No Comparison With State-of-the-art (Sota) Givenmentioning
confidence: 99%
“…With 400 iterations, their model applied to UNSW-NB15 datasets and synthetic datasets from five clients obtained 96.7% accuracy, which is higher than local models. The authors [23] proposed models for anomaly detection on two datasets, namely Contagio and CICIDS2017, using an unsupervised learning approach. Subsequently, the study will explore various known malware attacks targeting networks.…”
Section: Related Workmentioning
confidence: 99%