Toward Identifying APT Malware through API System Calls

16Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

Self-developed malware was usually used by advanced persistent threat (APT) attackers to launch APT attacks. Therefore, we can enhance the understanding and cognition of APT attacks by comprehending the behavior of APT malware. Unfortunately, the current research cannot effectively explain the relationship between the recognition, detection, and defense of APT. The model of similar studies also lacks an explanation about it. To defend against APT attacks and inquire about the similarity of different APT attacks, this study proposes an APT malware classification method based on a combination of multiple deep learning algorithms and transfer learning by collecting malware used in several famous APT groups in public. By extracting the application programming interface (API) system calls, with the vector representation of features by combining dynamic LSTM and attention algorithm, we can obtain API at different APT families classification contributions trained dynamic. Thus, we used transfer learning to perform multiple classifications of the APT family. This study aims to reduce the burden of network security staff from reviewing a large number of suspicious files when defending against APT attacks. Additionally, it can effectively intercept them in the initial invasion stage of APT to perform targeted defense against specific APT attacks by combining threat intelligence in public. The experimental result shows that the proposed method can achieve 99.2% in distinguishing common malware from APT malware and assign APT malware to different APT families with an accuracy of 95.5%.

References Powered by Scopus

Deep learning for classification of malware system call sequences

428Citations
N/AReaders
Get full text

Survey of machine learning techniques for malware analysis

393Citations
N/AReaders
Get full text

HOLMES: Real-time APT detection through correlation of suspicious information flows

340Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Dynamic Extraction of Initial Behavior for Evasive Malware Detection

10Citations
N/AReaders
Get full text

Attack Graph Generation with Machine Learning for Network Security<sup>†</sup>

9Citations
N/AReaders
Get full text

Detecting Unknown Threat Based on Continuous-Time Dynamic Heterogeneous Graph Network

7Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Wei, C., Li, Q., Guo, D., & Meng, X. (2021). Toward Identifying APT Malware through API System Calls. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/8077220

Readers over time

‘22‘23‘24‘250481216

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 9

64%

Lecturer / Post doc 2

14%

Researcher 2

14%

Professor / Associate Prof. 1

7%

Readers' Discipline

Tooltip

Computer Science 10

77%

Medicine and Dentistry 1

8%

Business, Management and Accounting 1

8%

Engineering 1

8%

Save time finding and organizing research with Mendeley

Sign up for free
0