A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base

Advanced persistent threat (APT) is a special attack method, which is usually initiated by hacker groups to steal data or destroy systems for large enterprises and even countries. APT has a long-term and multi-stage characteristic, which makes it difficult for traditional detection methods to effect...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Guozhu Wang, Yiwen Cui, Jie Wang, Lihua Wu, Guanyu Hu
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
T
Acceso en línea:https://doaj.org/article/6dedf2bd17224c4cbaf58478fe60f328
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:6dedf2bd17224c4cbaf58478fe60f328
record_format dspace
spelling oai:doaj.org-article:6dedf2bd17224c4cbaf58478fe60f3282021-11-11T15:00:11ZA Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base10.3390/app112198992076-3417https://doaj.org/article/6dedf2bd17224c4cbaf58478fe60f3282021-10-01T00:00:00Zhttps://www.mdpi.com/2076-3417/11/21/9899https://doaj.org/toc/2076-3417Advanced persistent threat (APT) is a special attack method, which is usually initiated by hacker groups to steal data or destroy systems for large enterprises and even countries. APT has a long-term and multi-stage characteristic, which makes it difficult for traditional detection methods to effectively identify. To detect APT attacks requires solving some problems: how to deal with various uncertain information during APT attack detection, how to fully train the APT detection model with small attack samples, and how to obtain the interpretable detection results for subsequent APT attack forensics. Traditional detection methods cannot effectively utilize multiple uncertain information with small samples. Meanwhile, most detection models are black box and lack a transparent calculation process, which makes it impossible for managers to analyze the reliability and evidence of the results. To solve these problems, a novel detection method based on belief rule base (BRB) is proposed in this paper, where expert knowledge and small samples are both utilized to obtain interpretable detection results. A case study with numerical simulation is established to prove the effectiveness and practicality of the proposed method.Guozhu WangYiwen CuiJie WangLihua WuGuanyu HuMDPI AGarticleadvanced persistent threatbelief rule baseattack detectionnetwork securityTechnologyTEngineering (General). Civil engineering (General)TA1-2040Biology (General)QH301-705.5PhysicsQC1-999ChemistryQD1-999ENApplied Sciences, Vol 11, Iss 9899, p 9899 (2021)
institution DOAJ
collection DOAJ
language EN
topic advanced persistent threat
belief rule base
attack detection
network security
Technology
T
Engineering (General). Civil engineering (General)
TA1-2040
Biology (General)
QH301-705.5
Physics
QC1-999
Chemistry
QD1-999
spellingShingle advanced persistent threat
belief rule base
attack detection
network security
Technology
T
Engineering (General). Civil engineering (General)
TA1-2040
Biology (General)
QH301-705.5
Physics
QC1-999
Chemistry
QD1-999
Guozhu Wang
Yiwen Cui
Jie Wang
Lihua Wu
Guanyu Hu
A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base
description Advanced persistent threat (APT) is a special attack method, which is usually initiated by hacker groups to steal data or destroy systems for large enterprises and even countries. APT has a long-term and multi-stage characteristic, which makes it difficult for traditional detection methods to effectively identify. To detect APT attacks requires solving some problems: how to deal with various uncertain information during APT attack detection, how to fully train the APT detection model with small attack samples, and how to obtain the interpretable detection results for subsequent APT attack forensics. Traditional detection methods cannot effectively utilize multiple uncertain information with small samples. Meanwhile, most detection models are black box and lack a transparent calculation process, which makes it impossible for managers to analyze the reliability and evidence of the results. To solve these problems, a novel detection method based on belief rule base (BRB) is proposed in this paper, where expert knowledge and small samples are both utilized to obtain interpretable detection results. A case study with numerical simulation is established to prove the effectiveness and practicality of the proposed method.
format article
author Guozhu Wang
Yiwen Cui
Jie Wang
Lihua Wu
Guanyu Hu
author_facet Guozhu Wang
Yiwen Cui
Jie Wang
Lihua Wu
Guanyu Hu
author_sort Guozhu Wang
title A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base
title_short A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base
title_full A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base
title_fullStr A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base
title_full_unstemmed A Novel Method for Detecting Advanced Persistent Threat Attack Based on Belief Rule Base
title_sort novel method for detecting advanced persistent threat attack based on belief rule base
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/6dedf2bd17224c4cbaf58478fe60f328
work_keys_str_mv AT guozhuwang anovelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT yiwencui anovelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT jiewang anovelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT lihuawu anovelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT guanyuhu anovelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT guozhuwang novelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT yiwencui novelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT jiewang novelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT lihuawu novelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
AT guanyuhu novelmethodfordetectingadvancedpersistentthreatattackbasedonbeliefrulebase
_version_ 1718437897341763584