skip to main content
10.1145/3571662.3571676acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccipConference Proceedingsconference-collections
research-article

Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec

Published:03 January 2023Publication History

ABSTRACT

In recent years, network security has become the main factor that threatens the development of the Internet. Among the network security threats, advanced persistent threat (APT) is one of the most representative attacks and has brought unprecedented security challenges. APT attacks mainly depend on malicious code. At present, the homology analysis of malicious code for APT mainly converts the malicious code into a gray image or semantic fragment, which is realized by pre-training models such as neural network. The effect of the method based on pre-training depends heavily on the training process of the model and the form of the data set, which may lead to misjudgment of the organization of the malicious code in an APT real-time attack. In this paper, we propose a homology analysis of malicious code for APT groups based on Asm2Vec. The basic function blocks are obtained by disassembling and removing unimportant functions from the malicious code. The semantic representation model Asm2Vec is used to analyze and find out the possible APT group for targeted malware. The experimental results show that the Energetic Bear group classification accuracy of this paper is 91.30% and the F1-Score is 95.46%.

References

  1. Stojanović Branka, Hofer-Schmitz Katharina, and Kleb Ulrike. 2020. APT datasets and attack modeling for automated detection methods: A review. Computers & Security, 92, 101734. https://doi.org/10.1016/j.cose.2020.101734Google ScholarGoogle ScholarCross RefCross Ref
  2. Kun Lv, Yun Chen, and Changzhen Hu. 2019. Dynamic defense strategy against advanced persistent threat under heterogeneous network. Information Fusion, 49, 216-226. https://doi.org/10.1016/j.inffus.2019.01.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahmad Atif, Webb Jeb, C. Desouza Kevin, and Boorman James. 2019. Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. Computers & Security, 86, 402-418. https://doi.org/10.1016/j.cose.2019.07.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jianyi Liu; Yansheng Qu; Jiaqi Li; Yunxiao Wang; Jing Zhang; and Hongshan Yin. 2021. Malicious Code Family Classification Method Based on Spatial Pyramid Pooling and Deep Residual Network. In 2021 IEEE 7th International Conference on Cloud Computing and Intelligent Systems (CCIS). IEEE, Xian, China, 260-264. https://doi.org/10.1109/CCIS53392.2021.9754597.Google ScholarGoogle Scholar
  5. Abdo Rassam Murad and Aizaini Maarof Mohd.. 2012. Artificial Immune Network Clustering approach for Anomaly Intrusion Detection. Journal of Advances in Information Technology, 3(3), 147-154. https://doi.org/10.4304/jait.3.3.147-154Google ScholarGoogle Scholar
  6. Al-Jarrah Omar and Arafat Ahmad. 2015. Network Intrusion Detection System Using Neural Network Classification of Attack Behavior. 6(1), 1-8. https://doi.org/10.12720/jait.6.1.1-8Google ScholarGoogle Scholar
  7. Md. Badiuzzaman Pranto, Md. Hasibul Alam Ratul, Md. Mahidur Rahman, Ishrat Jahan Diya, and Zunayeed-Bin Zahir. 2022. Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy -A Network Intrusion Detection System. Journal of Advances in Information Technology, 13(1), 36-44. https://doi.org/10.12720/jait.13.1.36-44Google ScholarGoogle Scholar
  8. Bilal Mehdi, Faraz Ahmed, Syed Ali Khayyam, and Muddassar Farooq. 2010. Towards a theory of generalizing system call representation for in-execution malware detection. In Proceedings of the IEEE International Conference on Communications (ICC). IEEE, Cape Town, South Africa, 1–5. https://doi.org/10.1109/ICC.2010.5501969Google ScholarGoogle ScholarCross RefCross Ref
  9. Ned Moran and James T. Bennett. 2013. Supply chain analysis: From quarter master to sunshop. Technical Report, Fire Eye Labs, 2013. https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-malware-supply-chain.pdfGoogle ScholarGoogle Scholar
  10. Yanchen Qiao, Xiaochun Yun, Yupeng Tuo, and Yongzheng Zhang. 2016. Fast reused code tracing method based on simhash and inverted index. Journal on Communications, 37(11), 104−113. https://doi.org/10.11959/j.issn.1000-436x.2016225Google ScholarGoogle Scholar
  11. Caliskan Aylin, Yamaguchi Fabian, Dauber Edwin, Harang Richard, Rieck Konrad, Greenstadt Rachel, and Narayanan Arvind. 2018. When coding style survives compilation:De-anonymizing programmers from executables binaries. In: Proc. of the Network and Distributed Systems Security (NDSS). Symp, San Diego, CA, USA, 1−15. http://dx.doi.org/10.14722/ndss.2018.23304.Google ScholarGoogle Scholar
  12. Steven H. H. Ding, Benjamin C. M. Fung, and Philippe Charland. 2019. Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, 472-489. https://doi.org/10.1109/SP.2019.00003Google ScholarGoogle ScholarCross RefCross Ref
  13. IDA pro. Website. https://www.hex-rays.com/products/ida/Google ScholarGoogle Scholar
  14. Le Quoc and Mikolov Tomas. 2014. Distributed representations of sentences and documents. In Proceedings of the 31st International Conference on Machine Learning. PMLR, Beijing, China, 1188–1196. https://doi.org/10.48550/arXiv.1405.4053Google ScholarGoogle Scholar
  15. Weixiang Chen, Xiaohan Helu, Chengjie Jin, Man Zhang, Hui Lu, Yanbin Sun, and Zhihong Tian. 2020. Advanced persistent threat organization identificationbased on software gene of malware. Transactions on Emerging Telecommunications Technologies, 31. https://doi.org/10.1002/ett.3884Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shudong Li, Qianqing Zhang, Xiaobo Wu, Weihong Han, Zhihong Tian, 2021. Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/9396141Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCIP '22: Proceedings of the 8th International Conference on Communication and Information Processing
      November 2022
      219 pages
      ISBN:9781450397100
      DOI:10.1145/3571662

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 January 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      ICCIP '22 Paper Acceptance Rate61of301submissions,20%Overall Acceptance Rate61of301submissions,20%
    • Article Metrics

      • Downloads (Last 12 months)52
      • Downloads (Last 6 weeks)4

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format