Publication:
An enhanced detection of advanced persistent threats using machine learning

Date

2023

Journal Title

Journal ISSN

Volume Title

Publisher

Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2023

Subject LCSH

Computer networks -- Security measures

Subject ICSI

Call Number

et TK 5105.59 A112E 2023

Research Projects

Organizational Units

Journal Issue

Abstract

Nowadays, countries are targeted by many electronic threats, which have expanded to reach almost all business sectors, either in private corporate entities or public institutions. Advanced Persistent Threats (APTs) are well-known examples of these electronic threats. APTs are very advanced and stealthy computer network attacks designed to gain unauthorized access to computer networks and remain undetected for an extended period. They represent one of the most critical cybersecurity challenges facing governments, corporations, and individuals. Since APT are categorized as the most critical cybersecurity threats, this study came to understand the nature of these attacks and propose a multi-stage framework to detect APT attacks based on the building on time series data. Unlike the previous model, the proposed approach can detect real-time attacks based on stored attack scenarios. This study has reviewed the background research, identified their strengths and weaknesses, and identified improvement opportunities. Moreover, available standardized techniques have been enhanced to detect APT attacks. Furthermore, the datasets used to feed the learning process are generated from different sources, including Journal logs, Traceability audits, and Systems monitoring statistics. Then, an effective APT detection and prevention system of Composition-Based Decision Tree (CDT) has been built/ developed/ implemented in complex environments. The results indicated that the proposed approach, on average, outperformed the existing algorithms reported in the literature. For example, the precision estimate of detecting whether the attack was malicious for the proposed model (CDT) was 96%, consistent with precision estimates by the existing algorithm: PRISM 96.9%, JRip 96%, and OneR 96%. However, the proposed model outperformed the existing algorithm when detecting whether the attack was benign. For example, the precision of CDT in this scenario was 50% compared to 0% for OneR, 10% for JRip, and 13.6% for PRISM. Overall, the average score indicates that the proposed model has outperformed the existing algorithms. For example, the average precision estimate for the proposed model was 94.3% compared to the existing algorithms, with values of 93.7%, 92.6%, and 92.1% for PRISM, JRip, and OneR, respectively. The evaluation of the CDT algorithm has been achieved by adopting the algorithm number 3 outputs to the NB Tree standard upon the WEKA software.

Description

Keywords

Advanced persistent threats; composition based decision tree; machine learning

Citation

Collections