loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Xiaojuan Cai 1 and Hiroshi Koide 2

Affiliations: 1 Department of Information Science and Technology, Information Science and Electrical Engineering, Kyushu University, Fukuoka, Japan ; 2 Section of Cyber Security for Information Systems, Research Institute for Information Technology, Kyushu University, Fukuoka, Japan

Keyword(s): Data Exfiltration, Command and Control Channel, Transfer Size Limitation, Advanced Persistent Threat, Deep Learning, Ensemble Tree, Extreme Gradient Boosting, Internet Traffic.

Abstract: Data exfiltration of Advanced Persistent Threats (APTs) is a critical concern for high-value entities such as governments, large enterprises, and critical infrastructures, as attackers deploy increasingly sophisticated and stealthy tactics. Although extensive research has focused on methods to detect and halt APTs at the onset of an attack (e.g., examining data exfiltration over Domain Name System tunnels), there has been a lack of attention towards detecting sensitive data exfiltration once an APT has gained a foothold in the victim system. To address this gap, this paper analyzes data exfiltration detection from two new perspectives: exfiltration over a command-and-control channel and limitations on exfiltration transfer size, assuming that APT attackers have established a presence in the victim system. We introduce two detection mechanisms (Transfer Lifetime Volatility & Transfer Speed Volatility) and propose an ensemble deep learning tree model, EDeepXGB, based on eXtreme Gradien t Boosting, to analyze data exfiltration from these perspectives. By comparing our approach with eight deep learning models (including four deep neural networks and four convolutional neural networks) and four traditional machine learning models (Naive Bayes, Quadratic Discriminant Analysis, Random Forest, and AdaBoost), our approach demonstrates competitive performance on the latest public real-world dataset (Unraveled-2023), with Precision of 91.89%, Recall of 93.19%, and F1-Score of 92.49%. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.144.48.13

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Cai, X. and Koide, H. (2023). New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree. In Proceedings of the 19th International Conference on Web Information Systems and Technologies - WEBIST; ISBN 978-989-758-672-9; ISSN 2184-3252, SciTePress, pages 276-285. DOI: 10.5220/0012181200003584

@conference{webist23,
author={Xiaojuan Cai and Hiroshi Koide},
title={New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree},
booktitle={Proceedings of the 19th International Conference on Web Information Systems and Technologies - WEBIST},
year={2023},
pages={276-285},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012181200003584},
isbn={978-989-758-672-9},
issn={2184-3252},
}

TY - CONF

JO - Proceedings of the 19th International Conference on Web Information Systems and Technologies - WEBIST
TI - New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree
SN - 978-989-758-672-9
IS - 2184-3252
AU - Cai, X.
AU - Koide, H.
PY - 2023
SP - 276
EP - 285
DO - 10.5220/0012181200003584
PB - SciTePress