信息安全研究 ›› 2022, Vol. 8 ›› Issue (8): 736-.

• 网络安全治理专题 • 上一篇    下一篇

基于LSTM的Linux系统下APT攻击检测研究

时林, 时绍森, 文伟平   

  1. (北京大学软件与微电子学院北京102600)
  • 出版日期:2022-08-08 发布日期:2022-08-08
  • 通讯作者: 时林 硕士研究生.主要研究方向为漏洞挖掘、软件安全防护. shilin@stu.pku.edu.cn
  • 作者简介:时林 硕士研究生.主要研究方向为漏洞挖掘、软件安全防护. shilin@stu.pku.edu.cn 时绍森 硕士.主要研究方向为恶意代码检测、漏洞挖掘、Web攻防. 511306747@qq.com 文伟平 教授,博士生导师.主要研究方向为系统与网络安全、大数据与云安全、智能计算安全. weipingwen@pku.edu.cn

  • Online:2022-08-08 Published:2022-08-08

摘要: 随着人们的日常生活被网络所覆盖,网络空间的安全问题也逐渐被重视起来.网络中的攻击手段多种多样,高级持续威胁(advanced persistent threat, APT)攻击是其中较为复杂并且危害性较高的一种,具有攻击过程贯穿系统外部与系统内部且持续性强的特点,并且难以检测与彻底防御.提出一种基于LSTM(long short-term memory)的Linux系统下APT攻击检测方案,构建了一款基于内核插桩的分析恶意Linux ELF文件的沙箱LAnalysis来捕获APT攻击中的恶意行为;通过使用LAnalysis分析结果数据集结合网络攻击流量数据集NSL-KDD,依据攻击时序特征构建了APT攻击数据集,解决了当前业内Linux系统下APT攻击数据集较为缺乏的问题;最后将APT攻击中的时序性引入检测,基于LSTM进行APT攻击的检测.实验结果表明,构建的APT攻击检测模型具有良好的应用效果.

关键词: APT攻击, Linux沙箱, 长短期记忆网络, APT攻击数据集, ELF文件

Abstract: As people’s daily life is covered by the network, the security of cyberspace has been paid more and more attention. There are many kinds of attack methods in the network. The APT attack is one of the more complex and harmful. It has the characteristics of strong sustainability and the attack process runs through the outside and inside of the system, and it is difficult to detect and thoroughly defend. This paper proposes a scheme of APT attack detection under a Linux system based on LSTM, constructs an analysis sandbox LAnalysis of malicious Linux ELF files based on kernel instrumentation to capture malicious behaviors in APT attacks, and constructs APT attack dataset by using LAnalysis analysis result dataset and network attack traffic dataset NSLKDD according to attack timing characteristics, This paper solves the problem of lacking APT attack dataset under the current Linux system in the industry. Finally, the timing of APT attacks is introduced into the detection, and APT attacks are detected based on LSTM. The experimental results show that the APT attack detection model constructed in this paper has a good application effect.

Key words: APT attack, Linux sandbox, long shortterm memory, APT attack dataset, ELF file