DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning

08/31/2021
by   Mohammad Mamun, et al.
0

APT, known as Advanced Persistent Threat, is a difficult challenge for cyber defence. These threats make many traditional defences ineffective as the vulnerabilities exploited by these threats are insiders who have access to and are within the network. This paper proposes DeepTaskAPT, a heterogeneous task-tree based deep learning method to construct a baseline model based on sequences of tasks using a Long Short-Term Memory (LSTM) neural network that can be applied across different users to identify anomalous behaviour. Rather than applying the model to sequential log entries directly, as most current approaches do, DeepTaskAPT applies a process tree based task generation method to generate sequential log entries for the deep learning model. To assess the performance of DeepTaskAPT, we use a recently released synthetic dataset, DARPA Operationally Transparent Computing (OpTC) dataset and a real-world dataset, Los Alamos National Laboratory (LANL) dataset. Both of them are composed of host-based data collected from sensors. Our results show that DeepTaskAPT outperforms similar approaches e.g. DeepLog and the DeepTaskAPT baseline model demonstrate its capability to detect malicious traces in various attack scenarios while having high accuracy and low false-positive rates. To the best of knowledge this is the very first attempt of using recently introduced OpTC dataset for cyber threat detection.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/19/2020

Early detection of the advanced persistent threat attack using performance analysis of deep learning

One of the most common and important destructive attacks on the victim s...
research
03/18/2022

Active Meta-Learner for Log Analysis

The analysis of logs is a vital activity undertaken for cyber investigat...
research
08/18/2022

LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Cyber threat hunting is a proactive search process for hidden threats in...
research
04/06/2021

Nonlinear Model Based Guidance with Deep Learning Based Target Trajectory Prediction Against Aerial Agile Attack Patterns

In this work, we propose a novel missile guidance algorithm that combine...
research
02/12/2018

RAPPER: Ransomware Prevention via Performance Counters

Ransomware can produce direct and controllable economic loss, which make...
research
08/27/2021

Modeling and Analyzing Attacker Behavior in IoT Botnet using Temporal Convolution Network (TCN)

Traditional reactive approach of blacklisting botnets fails to adapt to ...
research
12/01/2018

AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection

Insider threat detection is getting an increased concern from academia, ...

Please sign up or login with your details

Forgot password? Click here to reset