Advanced Persistent Threat Attack Detection Method
Advanced Persistent Threat Attack Detection Method
Array
journal homepage: www.elsevier.com/journals/array/2590-0056/open-access-journal
A R T I C L E I N F O A B S T R A C T
Keywords: APT (Advanced Persistent Threat) is a complex type of attack that steals personal data by staying in the infected
Advanced persistent threat system for a long time. When APT attacks take place in a dynamic and complex infrastructure such as the cloud,
Cloud computing their detection by traditional methods is very difficult. To overcome the limitations of existing methods the paper
Cybersecurity
proposes autoencoder based deep learning approach for APT attack detection. The advantage of this model is that
Two-factor authentication
One-time password
it achieves a high classification result by identifying complex relationships between features in a database.
Deep learning Additionally, the model simplifies the process of classifying large volumes of data by reducing the size of data in
Autoencoder the encoder. Here, first of all, the autoencoder neural network was applied, and informative features were studied
Softmax regression algorithm from the network traffic data in an unsupervised manner. After the informative feature study, softmax regression
layer was added to the top layer of the constructed autoencoder network to classify APT attacks. In this study, a
deep neural network model constructed by adding different layers was tested on a database open to scientific
research and compared to existing methods; the proposed method gave superior results in detection of APT at-
tacks. The average detection accuracy of the proposed APT detection framework was achieved of 98.32%. A
model for the application of the proposed approach to the cloud environment has been developed, and a two-
factor authentication system based on the OTP (One-Time Password) mechanism has been proposed to
strengthen the security of the cloud information system against APT attacks.
https://doi.org/10.1016/j.array.2021.100067
Received 29 October 2020; Received in revised form 8 March 2021; Accepted 12 April 2021
Available online 21 April 2021
2590-0056/© 2021 Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
F.J. Abdullayeva Array 10 (2021) 100067
analyse the network data in-depth and automatically derive the feature and exfiltrate confidential information of organizations and government
vector itself. bodies.
The idea of deep learning, first used by Hinton as well as the study of APTs usually use attachments consisting of a malicious application
features, implies the study of features descriptions from introductory being able to compromise the system or spear-phishing emails containing
data [7]. The idea of the approach proposed in the article is that in the a link [12].
present case if the features are physically selected, the information is APTs establish continuous and covert connections with information
automatically selected using a deep learning method. According to the technologies structures of an organization chosen as a target in order to
approach, the information encoder is applied to the trained data, first, the obtain (exfiltrate) information that can destroy critical aspects of the
informative features are studied, then the Softmax regression layer is organization or create an obstacle. APTs use several attack steps (for
used to classify the types of APT. instance, social engineering, C&C communications) in order to pass by
The main contributions of the work include: security solutions [13].
It is attempted to explain APT with abbreviations used in this
1. An APT attack detection model has been established. expression:
2. The multi-step structure of APTs is described.
3. The architecture of the APT detection system is proposed. Advanced – expresses that attackers are well-taught, well-organized
4. The application model of the APT detection system in the cloud and well-funded, and network infiltration technologies are utilized in
environment has been established. full spectrum.
5. A two-factor authentication system based on the OTP mechanism has Persistent – reflects the continuous character of these attacks. In this
been proposed to ensure that the cloud information system is resistant case, attackers establish a long-term network presence and attempt to
to APT attacks. compromise the system seriously. So far, the longest-term APT attack
6. The proposed method for detecting APT has been tested on network has been the APT1 group and it lasted four years 10 months.
traffic. Threat – reflects the exfiltration of classified data of an organization
possessing strategic information. As the aim is to steal confidential
The paper is structured as follows. Section 2 describes the computer data, APT attacks usually cause large-scale damage to a target.
network attack categories, presents an overview of the Advanced
Persistent Threats concept, and defines the distinctive features of APT The analysis of specific APT samples shows that there is no resem-
attacks. Section 3 reviews related work literature. Section 4 defines the blance among all APT attacks and they are specifically tailored to each
problem statement. Section 5 presents the proposed APT detection model target [14].
based on Autoencoder, describes the deployment model of the proposed However, the steps of APT attacks are similar in most attacks and
approach to the cloud computing environment, and presents the archi- those differ according to a specific method used at each step. During all
tecture of the defense system against the APT attack. Section 6 presents work processes of APTs, a threat agent initially collects open sources in
the results of the experimental evaluation on real network traffic data. order to determine targets. After the attacker obtains secret key and es-
Finally, Section 7 presents the conclusion of the work. tablishes a support point, it escalates its privileges, spreads in the
cybernetwork and eventually gains access to confidential information.
2. Categories of computer network attacks Different steps of APT attacks are given in various sources according
to the implementation sequence of an APT attack [5,15].
Attacks to computer networks are classified into two categories [8]: The multistep structure of APTs can be described as in Fig. 1.
2
F.J. Abdullayeva Array 10 (2021) 100067
collect information about security configurations of the hardware and individuals, but by cybercriminal organizations [15]. Each member of
related system information covertly, capture passwords and collect user the group possesses specific experience and knowledge.
emails in order to perform next attacks and collect network users’ names Unlike DDoS attacks, APTs are types of attacks organized via com-
and directory lists in general network folders. At this stage, RAT connects puter viruses, trojans and worms and usually try to disguise in network
to C&C server of the attacker in order to receive commands to be devices (personal computers, servers, mobile devices). The feature of
executed on target network. The characteristics of this stage is that the APT is to exfiltrate data inside the network to external devices of the
connection attempt is not carried out by the attacker, but by the victim network.
host. While DDoS attacks are large-scale and destructive, APTs have an
opposite nature; they are unnoticeable, covert and can be organized as
2.1.4. Privilege escalation small- or large-scale attacks. The goal of long-term attacks is to remain
This stage provides long-term persistent presence in organization’s unnoticeable as long as possible in order to achieve maximum exfiltra-
network. Attackers move horizontally in the network, detect servers tion. APT is not considered a distributed attack. The feature of APT at-
storing sensitive information and users authorized with priority access tacks is to be covert.
and create a strategy to collect and export target information. Operators An expert attacker imitates a normal attacker’s behavior in APT and
regularly target privileged users with phishing letters. If exploits are does not attempt to spread the virus widely by only compromising a
successful, they escalate their access privilege to information. limited number of hosts. However, the opposite is the case of traditional
malware which try to spread as much as possible unlike the APTs.
2.1.5. Data collection lateral movement There are substantial differences between botnet attacks and APTs.
At this stage, operators attempt to maintain access to target infor- Thousands or millions of hosts participate in botnet, while APTs are at-
mation by using collected account data of priority users at the previous tacks oriented to a specific organization and controlled by a specific
stage. By using complex tools, attackers establish superfluous C&C person. Botnet approaches, the aim of which is to detect similar behav-
channels if sudden changes will take place in security configuration of the iors (via the clustering of traffic features) in hosts’ groups, cannot be
organization. When access is gained to target information, one or mul- applied in an APT domain. It is due to the fact that APT can only
tiple superfluous copies of this information is created in servers acting as compromise a given number of hosts while C&C servers use the protocols
“staging points”. Information is segmented, defragmented and coded of a subset of victim hosts. Hence, it is not possible to carry out wide-
before being exfiltrated at this stage. The attacker attempts to gain access range cluster analysis suggested in botnet detection approaches in case
to other hosts within the target network via more escalated privileges of APT in order to determine multiple hosts which are abnormal traffic
requirable for the access to valuable resources at this stage. For example, templates. Moreover, the compromise strategies are different: APTs uti-
RAT can perform internal scanning in the network where it is present or lize spear-phishing and zero-day exploits in order to compromise victim
initiate a new connection in other internal hosts (via Secure Shell, SSH). computers while botnets replicate themselves in a more aggressive
manner.
2.1.6. Exfiltration Insider threats have some common features with APT attacks. APT
At this stage, information collected and packaged in staging point attempts to gain control over the real host within organization, but an
servers are transmitted via encrypted channels to several external servers attacker tries to imitate a normal behavior to avoid being detected. The
acting as drop points. The utilization of multiple drop point servers is a main difference of APTs from insider threats is that insiders do not carry
deceptive strategy in order to prevent the detection of final drop point of out the exfiltration of data via network. Hence, the majority of ap-
data by researchers. Stolen data is sent to one or several remote servers proaches for detecting the insider threats is based on the analysis of host-
managed by the attacker at this stage. Information can either be exfil- based log files and honeypot strategies. Unlike APT detection the analysis
trated completely at once or leaked covertly and at low speed if the of network traffic is not carried out in detecting insider threats [16].
attacker aims to steal data persistently.
3. Related work
2.2. Distinctive features of APT attacks
Neupane et al. [17] propose an approach called Dolus for detecting
The possession of specific characteristics by APTs makes their target-oriented attacks (DDoS and APT) towards services hosted in cloud
detection very hard. Unlike traditional attacks, they usually use zero-day platforms. The detection of DDOS attacks in the system of two-stage
vulnerabilities and target a specific organization. APTs’ simulation of Dolius ensemble learning proposed in this study utilizes the data min-
normal behavior and use of social engineering strategies complicates ing of threats. The first stage encompasses the detection of anomalies for
their detection. the implementation of detection of noticeable events (port exhaustion).
Another distinctive feature is that APTs are performed not by private The second stage serves to distinguish the event of DDoS attack within
3
F.J. Abdullayeva Array 10 (2021) 100067
the main five attack vectors. ADAPT (Automated Defense against proposed for the ranking of internal hosts engaged in data exfiltration of
Advanced Persistent Threats) strategy is applied in the Dolus system in APT. The behavior of each host is modeled as a feature point in a
order to carry out the resistance to APT attacks. The goal of the ADAPT multidimensional space. Thereafter, a score value is assigned to each
module is to detect devices compromised by APT by tracking the data internal host based on the suspiciousness positions in feature space and
exfiltrated outside the boundaries of the corporate network. Suspi- ranking is conducted. Johnson et al. [27] propose an assessment method
ciousness scores are used in order to detect APTs and determine systems of the growth risk of privileges of network users based on graph theory
compromised by APT. The suspiciousness score is assigned to each device for detecting APT at the stage of privilege escalation. Vance et al. [28]
within or outside the network. The score value is determined based on develop an approach for detecting APT attacks by applying a method of
the number of unique drop points, total number of connections, and the statistical detection of anomalies for the purpose of the analysis of
total number of transmitted bytes. External devices considered as sus- network communications.
picious are eventually isolated from devices of the internal network. A Xiao et al. [29] provide prospect theoretic study on APT defense. This
multivariate Gaussian algorithm is used to detect anomalies. In order to study discloses the impact of the subjective view of an APT attacker on
develop an ensemble approach, averaging or Bayesian-based majority the data safety levels of a cloud storage. In this paper, an asymmetric
voting method is employed. evolutionary game between the APT attacker and the cloud storage de-
Stojanovi’c et al. [18] conduct an analysis of existing databases in the fender was formulated to find the evolutionary stable strategies in the
area of detecting APT attacks and studies APT attacks carried out in large APT defense games. Rosenberg et al. [30] propose DeepAPT model based
corporate networks, cyber-physical systems, cloud computing systems, on deep neural networks to detect APT attacks. The difference between
financial networks and networks of the internet of things. Distinctive this work and ours is that it does not provide information on the stage at
stages of this type of APT attack are described. Ghafir et al. [19] develop a which APT is detected, and the features used to detect APT do not reflect
system titled MLAPT (machine learning based APT) based on machine the actual features of APT. Additionally, an approach based on the syn-
learning in order to detect APT attacks. MLAPT consists of three blocks: thesis of a softmax classifier with an autoencoder model in the field of
detection of a threat, correlation of events and forecasting of an attack. detection of APT attacks was proposed firstly in our study, and the
The function of the block of the correlation of events is to create a cor- approach showed a high result with a classification accuracy of 98.32%.
relation between detected events and the types of APT attacks. The The advantage of using an autoencoder is that this model can operate
rationale for using the correlation approach is to reduce the detection of efficiently and faster with large amounts of data by reducing the size in
false positive rates of the MLAPT detection system. Giura et al. [20] the encoder. Additionally, the model achieves a high classification result
model APT as an attack pyramid. The goal of the attack is placed on the by identifying complex relationships between features in a dataset.
upper layer of the attack pyramid and lateral planes describe environ- Existing approaches are confined to detecting only one step of APT
ments where attack-related events can be recorded (for instance, phys- and disregard other APT activities. This implies that if a detection system
ical, user, network, application planes, etc.). The layers of the attack disregards any malicious block of APT, the complete APT scenario will
pyramid are constituted of steps of the APT attack. The proposed remain undetected. Moreover, the detection of separate malicious ac-
detection scheme correlates all events relevant to the recorded security in tivities at different APT stages such as data exfiltration, malicious URL
the organization. Huang et al. [21] propose a dynamic approach based on connection, etc. cannot be considered as the complete detection of APT.
game theory which detects a long-term mutual connection between a Another shortcoming of these methods is that these methods allow high
covert attacker and proactive defender in cyber-physical systems. false positive detection errors while detecting APT attacks due to the
Andrew [22] proposes a detection approach based on the APT matching of real and anomalous events.
network flows. The approach carries out the detection via the statistical
modeling of APT communications. Zimba et al. [23] propose a method 4. Problem statement
for weighted modeling of attack routes based on Bayesian network for
the modeling of mutually connected attack routes generated by APT at- Assume that training data D ¼ fðxi ; yi Þgni¼1 consisting of n number of
tackers via the exploitation of faults in cloud components. The penetra-
APT samples are given. Here, xi 2 RD is a D-dimensional APT attack
tion to the components of the cloud with faults during the attack
vector and yi 2 ½1; K are corresponding types of attack classes. It is
generates virtual attack routes. The faults of the target system are
required to detect new unknown attacks not participating in a given
described as attack graphs. The nodes and arrows of each attack route are
dataset at learning stage.
determined in constructed acyclically oriented graph. These nodes and
arrows are deemed important for selecting resistance strategies. An
optimization algorithm is proposed to find the shortest attack route. 5. Proposed APT detection model based on autoencoder
Usually, all APT attacks start by incentivizing the users to use social
phishing, e-mail spam, e-mail phishing. Here, phishing directs the users The architecture of APT detection system represented in Fig. 2.
to fake domains and users end up downloading malware as a result. The proposed detection framework consists of two blocks: extraction
Hence, the detection of APT attacks by determining unknown domains of features and classification of attacks. Firstly, features are extracted by
plays an important role. Cho et al. [24] propose a method based on the applying autoencoder neural network to the network traffic in order to
monitoring of accesses to unknown domains. Here, when unknown do- detect the techniques used in APT lifecycle. The vector of the features of
mains are detected, warning signals are generated for users. Zimba et al. events generated by separate techniques are produced as module output.
[25] propose a semi-supervised machine learning method in order to Generated vector of features is transmitted to the classification module
detect APT attacks. The target network here is modeled as a global thereafter. The vector of features more similar to the same APT attack
network, while the detected APT attack network is modeled as a scenario are categorized in this module.
scale-free network. The transition states of nodes in time domain are The presented article utilizes deep autoencoder neural network for
modeled as finite automata in order to characterize the state changes the purpose of learning training data fxi gni¼1 . Autoencoder is a symmetric
during APT attack. Marchetti et al. [26] review the issue of detecting neural network and usually studies the features of databases in an un-
suspicious hosts. The approach proposed here detects APT attacks at the supervised manner. Autoencoder builds the description of features by
exfiltration stage. Traffic data are collected and features pertaining to the reconstructing input data xi . Sometimes autoecoder is used for reducing
exfiltration stage are determined for this purpose. An approach is the scale as in PCA. PCA employs a linear function for carrying out the
data transformation, while autoencoder utilizes a nonlinear one. In the
4
F.J. Abdullayeva Array 10 (2021) 100067
s 2
simplest sense, autoencoder is comprised of encoder, hidden and decoder 1X
Eðx; ~xÞ ¼ xi ~xi (3)
layers (Fig. 3). 2 i
Non-linear function fΘ is applied in order to map access vector xi to
hidden layer zi in encoder part: Θ ¼ fW; bg ¼ argminΘ Eðx; ~xÞ (4)
fΘ ðxi Þ ¼ SðWxi þ bÞ (1) The proposed APT detection model has utilized softmax regression
layer in order to carry out the multiclass classification (logistic regression
where, Wis the weight matrix of encoder, b is the bias vector of encoder, can be used for a binary classification) (Fig. 4).
S is a sigmoid activation function and Θ are mapping parameters ½W; b. As network has large size, it is important to increase the effectiveness
Sigmoid function is calculated as S ¼ 1=ð1 þ expð vÞÞ. of detection in order to reduce the size of this data. The data volume in
At the decoding stage, to reconstract the input data xi , the input data the proposed approach is reduced via the hidden layer of autoencoder. By
is mapped into the hidden layer via nonlinear activation function: using a nonlinear function in the encoder layer, multiple features are
0 0
transformed into feature set. The selection of features is carried out via an
gΘ0 ðxi Þ ¼ S Wzi þ b (2) algorithm without using the human knowledge. The goal of choosing the
features is to find better learned observations.
0 0 0
where, W is dh do dimensional weight matrix, b is a bias vector, Θ are
0 0
mapping parameters ½W ; b . 5.1. Application of APT detection system to cloud environment
In the autoencoder model, the input data is compressed first and
thereafter, these data are used as input data of decoder in order to repair The developed attacks detection system must be located correctly in
the original data for the purpose of learning the hidden layer. It is order to provide the protection of cloud environment against the impact
attempted to minimize reconstruction errors (the difference between of attacks. As cloud systems transmit the data to users via Internet, it is
original data and its small-scale reconstruction) during the training deemed necessary to locate the detection module on the transmission line
process. This difference is calculated for straining data as follows: between Internet and cloud. The application model of the proposed
detection module to cloud environment is described in Fig. 5.
During the preparation, APT attacks perform the stealth of the user’s
password who has access to information in order to obtain confidential
information (third stage of APT). In APT login credentials can be ac-
quired either by social engineering, by using some form of side channel
attack, by eavesdropping (unprotected) communication and by guessing
Fig. 3. Autoencoder neural network. Fig. 4. Constructed APT detection autoencoder neural network model.
5
F.J. Abdullayeva Array 10 (2021) 100067
Fig. 6. Two-Factor Authentication (2FA) of the user into cloud sensitive data.
passwords. During APT attack, an attacker acquires user’s passwords and carry out user authentication.
exfiltrates the confidential information by logging into user’s computer OTP is only useable for one-time utilization and those are usually
in his/her behalf. The article proposes an architecture of the security limited by time factor. OTPs have a dynamic character. Each new OTP is
system of cloud services resilient to APT attacks in order to prevent the generated based on a query as a unique sequence of numbers. OTP is
occurrence of APT attack (Fig. 6). entered to the web-terminal by user. The possession of information about
The architecture is based on a two-factor authentication mechanism authentic OTP code by the user confirms that the account belongs to the
and utilizes a traditional static and one-time passwords (OTP) in order to user for authentication systems. The utilization of OTP with a traditional
6
F.J. Abdullayeva Array 10 (2021) 100067
Table 1
The features of the MalwareTrainingSets dataset.
# Feature # Feature # Feature
static password can be the most effective security mechanism for cloud Nowadays, all systems are protected with username and password
infrastructure against APT attacks. The work principle of the proposed which is a one-factor authentication mechanism. However, one-factor
system is as follows: authentication systems are not deemed satisfactory for the protection
of cloud infrastructure against cyberattacks which steal personal
Step 1. Users send their user name and password to server while information.
logging in. Several shortcomings exist related to the use of passwords and those
Step 2. Server checks whether the user is registered in the system, are considered as a weak authentication mechanism [31]. Two-factor
generates one-time OTP password based on user information and authentication is used in order to eliminate the problems of passwords.
recorded time and sends it to user’s mobile phone via SMS. In this case, a special algorithm is adopted which generates a one-time
Step 3. Thereafter, the user enters the OTP code received via SMS password sent to a mobile phone via SMS in order to provide
(Short Message Service) to the system. two-factor authentication.
Step 4. If a one-time password generated by the client matches a one-
time password generated by the server, the user is authenticated. 6. Experiments
The use of username and password together with OTP code compli- 6.1. Dataset description
cates the maintaining of access to the system by APT attacks and theft of
individual’s personal information. The goal of OTP generator is to further The detection of APT attacks is considered to be a complex and the
complicate the theft of unauthorized access to limited resources, for most popular research area in scientific community and the lack of
instance, to confidential database. It becomes impossible for the attackers benchmark datasets in this area causes serious problems.
to steal users’ identification data during the application of this approach. MalwareTrainingSets dataset has been used in this study in order to
7
F.J. Abdullayeva Array 10 (2021) 100067
conduct experiments [32]. 292, 2024, 434, 2014 samples are included to Azerbaijan National Academy of Sciences (AzScienceNet) with the
the compiled dataset for APT1, Crypto, Locker, Zeus malwares, following characteristics (Ubuntu 16.04.3 LTS AMD64 system with
respectively. 331.2-GB memory and 2933.437-MHz CPU).
The features of the dataset are given in Table 1. In this paper, the Autoencoder model was built using Theano’s library
Behavioral characteristics of the Network were used to detect APT. of the Python package and was illustrated in Fig. 7. One part of the
These features are transmitted in the vector form of the input of the autoencoder model architecture is an encoder, and another part is a
classification algorithm. Given samples for properties used are the decoder. The encoder part of the network consists of 5 layers. The
following: decoder performs the reverse operation to the encoder and consists of 5
layers.
1) The megabytes size of the data transmitted from internal hosts to The encoding part comprises five layers with 14, 7, and 7 nodes.
external hosts. This feature indicates the change in the amount of Encoding architecture is connected to latent view space comprising of 3
information transmitted. If we observe a sharp increase in the amount nodes which is then connected to decoding architecture with 7, 7, and 14
of information transmitted from any host, then it can be considered nodes. The final layer comprises exact number of nodes as the input layer.
affected by the APT attack. In this study the number of nodes of the input layer are 3. Relu is used as
2) The number of connections initiated from internal hosts to external the activation function in the encoding and decoding layers. In the final
hosts. This feature indicates the data transferring process initiated by layer where we reconstruct the input data we use softmax activation
internal hosts. Because exfiltration is initiated by internal hosts. Here function.
we consider rarely established relationships as the APT attacker tries The summary of the constructed Autoencoder model is shown in
to create a small number of communications to avoid detection. Table 2.
3) The number of external IP addresses connected to the communica- The parameters given in Table 2 are generated as a result of experi-
tions initiated by internal hosts. This feature refers to the change in ments conducted on MalwareTrainingSets dataset. By application of
the number of different destination points associated with each in- autoencoder model into the considered dataset the obtained prediction
ternal host. If the number of external IP addresses connected to the results are shown in Table 3.
internal host remains unchanged and the number of transmitted bytes In the conducted experiments, the autoencoder model is provided the
increases significantly, this may indicate that the host has been best results over the dataset. From Table 3, we can see that the method
affected by an APT attack and the data exfiltration has occurred. provided the best results, and RMSE values of the mentioned method
over train and test process achieved 0.0010 and 0.0011 values, respec-
Three data classes are constructed in order to conduct experiments in tively. From these values, the advantage of the constructed autoencoder
this study: APT1, Crypto and other types of attacks. In the data pre- model is obvious. On the contrary in Convolutional Neural Network and
processing stage separating the data into train and test set is provided. Simple Neural Network, these values are worth.
Besides this, to equate the data effect on the results of the classification, As shown in Table 3, it is seen that the autoencoder algorithm has
their normalization was carried out. The difference between the training trained the neural network with little loss and high accuracy (training
and test dataset is that we use the training data to fit the model and loss ¼ 0.0010, training accuracy ¼ 0.9932). During the testing process,
testing data to test it. To implement this process the dataset is divided this model is also achieved low loss and high accuracy values (training
into train and test set to check accuracies, precisions by training and loss ¼ 0.0011, training accuracy ¼ 0.9897). These results show that the
testing model on dataset. In this study 80% of the data was taken for neural network has not suffered a great loss during prediction and almost
training and 20% for testing. carried out the prediction (testing accuracy ¼ 0.9897) well. As the
During the experiment, autoencoder neural network is firstly trained number of iterations has increased during the training of the developed
on MalwareTrainingSets dataset and the attacks are classified by trans- autoencoder model, the model produces more accurate results with
mitting the results obtained as the output of the autoencoder to the input
of softmax regression algorithm thereafter. We note that the experiments
Table 2
are carried out on Data Center of Institute of Information Technology of Constructed Autoencoder model.
Layer (type) Output Shape Param #
Table 3
Prediction results of the autoencoder model on MalwareTrainingSets dataset.
Method Metrics Values
8
F.J. Abdullayeva Array 10 (2021) 100067
Table 4
Attacks classification accuracy.
Attack types Autoencoder KNN SVM CNN SNN Number of samples
9
F.J. Abdullayeva Array 10 (2021) 100067
10
F.J. Abdullayeva Array 10 (2021) 100067
[27] Johnson JR, Hogan EA. A graph analytic metric for mitigating advanced persistent [30] Rosenberg I, Sicard G, David EO. DeepAPT: nation-state APT attribution using end-
threat. Proc. of the IEEE International Conference on Intelligence and Security to-end deep neural networks. Proc. of the International Conference on Artificial
Informatics 2013:129–33. Neural Networks (ICANN) 2017;10614:91–9.
[28] Vance A. Flow based analysis of advanced persistent threats detecting targeted [31] Kora D, Simi D. Fishbone model and universal authentication framework for
attacks in cloud computing. In: Proc. Of the IEEE first international scientific- evaluation of multifactor authentication in mobile environment. Comput Secur
practical conference on problems of infocommunications science and Technology; 2019;85:313–32.
2014. p. 173–6. [32] Ramilli M. Malware Training Sets: a machine learning dataset for everyone. 2016.
[29] Xiao Liang, et al. Cloud storage defense against advanced persistent threats: a https://marcoramilli.com/2016/12/16/malware-training-sets-a-machine-learni
prospect theoretic study. IEEE J Sel Area Commun 2017;35(3):534–44. ng-dataset-for-everyone.
11