Saha, Aakanksha;
Blasco, Jorge;
Cavallaro, Lorenzo;
Lindorfer, Martina;
(2024)
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
In:
Proceedings of RAID '24: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses.
(pp. pp. 114-129).
ACM
Preview |
Text
raid2024-19.pdf - Accepted Version Download (955kB) | Preview |
Abstract
Recent years have witnessed a surge in the growth of Advanced Persistent Threats (APTs), with significant challenges to the security landscape, affecting industry, governance, and democracy. The ever-growing number of actors and the complexity of their campaigns have made it difficult for defenders to track and attribute these malicious activities effectively. Traditionally, researchers relied on threat intelligence to track APTs. However, this often led to fragmented information, delays in connecting campaigns with specific threat groups, and misattribution. In response to these challenges, we introduce ADAPT, a machine learning-based approach for automatically attributing APTs at two levels: (1) the threat campaign level, to identify samples with similar objectives and (2) the threat group level, to identify samples operated by the same entity. ADAPT supports a variety of heterogeneous file types targeting different platforms, including executables and documents, and uses linking features to find connections between them. We evaluate ADAPT on a reference dataset from MITRE as well as a comprehensive, label-standardized dataset of 6,134 APT samples belonging to 92 threat groups. Using real-world case studies, we demonstrate that ADAPT effectively identifies clusters representing threat campaigns and associates them with their respective groups.
Type: | Proceedings paper |
---|---|
Title: | ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files |
Event: | 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) |
Location: | ITALY, Padua |
Dates: | 30 Sep 2024 - 2 Oct 2024 |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1145/3678890.3678909 |
Publisher version: | https://doi.org/10.1145/3678890.3678909 |
Language: | English |
Additional information: | This work is licensed under a Creative Commons Attribution 4.0 International License. |
Keywords: | Malware, advanced persistent threats, attribution, clustering |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/10212286 |
Archive Staff Only
![]() |
View Item |