2014
DOI: 10.13089/jkiisc.2014.24.5.839
|View full text |Cite
|
Sign up to set email alerts
|

Host based Feature Description Method for Detecting APT Attack

Abstract: As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The decision tree has been trained and generated from the frequency count of API calls in our previous study [10] by C4.5 algorithm of WEKA [15] data mining tool. C4.5 is the popular algorithm of decision tree mechanism.…”
Section: Data Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…The decision tree has been trained and generated from the frequency count of API calls in our previous study [10] by C4.5 algorithm of WEKA [15] data mining tool. C4.5 is the popular algorithm of decision tree mechanism.…”
Section: Data Classificationmentioning
confidence: 99%
“…C4.5 is the popular algorithm of decision tree mechanism. About 2000 input data from both malware samples and benign applications from the previous study [10] were used to train the decision tree model. In this step, our training data with 856 malware samples was classified into 48 malware groups by this decision tree.…”
Section: Data Classificationmentioning
confidence: 99%