Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 2 von 252
International journal of computational intelligence systems, 2023-11, Vol.16 (1), p.1-14, Article 184
2023
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
APT Attack Detection Based on Graph Convolutional Neural Networks
Ist Teil von
  • International journal of computational intelligence systems, 2023-11, Vol.16 (1), p.1-14, Article 184
Ort / Verlag
Dordrecht: Springer Netherlands
Erscheinungsjahr
2023
Quelle
EZB Free E-Journals
Beschreibungen/Notizen
  • Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks that pose significant challenges to the information security of governments and enterprises. Traditional detection methods struggle to extract long-term relationships within these attacks effectively. This paper proposes an APT attack detection model based on graph convolutional neural networks (GCNs) to address this issue. The aim is to detect known attacks based on vulnerabilities and attack contexts. We extract organization-vulnerability relationships from publicly available APT threat intelligence, along with the names and relationships of software security entities from CVE, CWE, and CAPEC, to generate triple data and construct a knowledge graph of APT attack behaviors. This knowledge graph is transformed into a homogeneous graph, and GCNs are employed to process graph features, enabling effective APT attack detection. We evaluate the proposed method on the dataset constructed in this paper. The results show that the detection accuracy of the GCN method reaches 95.9%, improving by approximately 2.1% compared to the GraphSage method. This approach proves to be effective in real-world APT attack detection scenarios.
Sprache
Englisch
Identifikatoren
ISSN: 1875-6883
eISSN: 1875-6883
DOI: 10.1007/s44196-023-00369-5
Titel-ID: cdi_doaj_primary_oai_doaj_org_article_bcc654bc721b47c0bdd54c5afbbe16a0

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX