Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (5): 107-117.doi: 10.19665/j.issn1001-2400.20221105

• Cyberspace Security • Previous Articles     Next Articles

Cause-effectgraph enhanced APT attack detection algorithm

ZHU Guangming1(),LU Zijie1(),FENG Jiawei2(),ZHANG Xiangdong2(),ZHANG Fengjun3(),NIU Zuoyuan3(),ZHANG Liang1()   

  1. 1. School of Computer Science and Technology,Xidian University,Xi’an 710071,China
    2. School of Telecommunications Engineering,Xidian University,Xi’an 710071,China
    3. The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu 610041,China
  • Received:2022-09-28 Online:2023-10-20 Published:2023-11-21
  • Contact: Liang ZHANG E-mail:gmzhu@xidian.edu.cn;21031211705@stu.xidian.edu.cn;20011210262@stu.xidian.edu.cn;xdchen@mail.xidian.edu.cn;fjzhang2020@163.com;niuzuoyuan@163.com;liangzhang@xidian.edu.cn

Abstract:

With the development of information technology,the cyberspace also derives an increasing number of security risks and threats.There are more and more advanced cyberattacks,with the Advanced Persistent Threat(APT) attack being one of the most sophisticated attacks and commonly adopted by modern attackers.Traditional statistical or machine learning detection methods based on network flow are challenging in coping with complicated and persistent APT-style attacks.Aiming to overcome the difficulty in detecting APT attacks,a cause-effect graph enhanced APT attack detection algorithm is proposed to model the interaction process between network nodes at different times and identify malicious packets in the attack process in network flows.First,the causal-effect graph is used to model the network packet sequences,and the data flows between IP nodes in the network are associated to establish the context sequence of attack and non-attack behaviors.Then,the sequence data are normalized,and the deep learning model based on the long short-term memory network(LSTM) is used for sequence classification.Finally,based on the sequence classification results,the original packets are screened for malignancy.A new dataset is constructed based on the DAPT 2020 dataset,with the proposed algorithm’s ROC-AUC indicator on the test set reaching 0.948.Experimental results demonstrate that the attack detection algorithm based on causal-effect graph sequences has obvious advantages and is a feasible algorithm for detecting APT attack network flow.

Key words: network security, anomaly detection, Long Short-Term Memory, network flow context

CLC Number: 

  • TN915.08