• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于TCN-GAN的高级持续性威胁(APT)组织恶意软件分类研究

Research on APT groups malware classification based on TCN-GAN.

作者信息

Chen Daowei, Yan Hongsheng

机构信息

School of Information and Communication, National University of Defense Technology, Wuhan, China.

出版信息

PLoS One. 2025 Jun 10;20(6):e0323377. doi: 10.1371/journal.pone.0323377. eCollection 2025.

DOI:10.1371/journal.pone.0323377
PMID:40493540
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12151386/
Abstract

Advanced Persistent Threat (APT) malware attacks, characterized by their stealth, persistence, and high destructiveness, have become a critical focus in cybersecurity defense for large organizations. Verifying and identifying the sources and affiliated groups of APT malware is one of the effective means to counter APT attacks. This paper addresses the issue of tracing and attributing APT malware groups. By improving and innovating the extraction methods for image features and disassembled instruction N-gram features of APT malware, and based on the Temporal Convolutional Network (TCN) model, the paper achieves high-accuracy classification and identification of APT malware. To mitigate the impact of insufficient APT malware samples and data imbalance on classification performance, the paper employs Generative Adversarial Networks (GAN) to expand the sample size. Validation on both public and self-constructed datasets shows that the proposed method achieves an accuracy and precision rate of 99.8%, significantly outperforming other methods. This work provides a foundation for subsequent countermeasures and accountability against related APT attack groups.

摘要

高级持续性威胁(APT)恶意软件攻击具有隐蔽性、持续性和高度破坏性,已成为大型组织网络安全防御的关键重点。验证和识别APT恶意软件的来源及附属组织是应对APT攻击的有效手段之一。本文探讨了APT恶意软件组织的追踪和溯源问题。通过改进和创新APT恶意软件的图像特征及反汇编指令N-gram特征提取方法,并基于时间卷积网络(TCN)模型,实现了对APT恶意软件的高精度分类和识别。为减轻APT恶意软件样本不足和数据不平衡对分类性能的影响,本文采用生成对抗网络(GAN)扩大样本规模。在公共数据集和自建数据集上的验证表明,该方法的准确率和精确率达到99.8%,显著优于其他方法。这项工作为后续针对相关APT攻击组织的应对措施和责任追究奠定了基础。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b59f10983a2b/pone.0323377.g030.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/68cfb0f11aab/pone.0323377.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/904c188f9208/pone.0323377.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/9a9b2bba0b39/pone.0323377.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/ca424aef8e6b/pone.0323377.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/2b2df45a9eba/pone.0323377.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b1ffaa673d37/pone.0323377.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/1f8c86f27902/pone.0323377.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/9fc4353a4978/pone.0323377.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/46829ffc2e2f/pone.0323377.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/64f4b621e023/pone.0323377.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/a06d3ca4721e/pone.0323377.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/bd23c372b3c1/pone.0323377.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/0cdc6c1df69d/pone.0323377.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/dca506298a39/pone.0323377.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/318deefa6765/pone.0323377.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/94590b8cd7f5/pone.0323377.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/a49e75a517d3/pone.0323377.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/2d87dfecedaa/pone.0323377.g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/c99cdb0cc1c9/pone.0323377.g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b0cc74e2694f/pone.0323377.g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/de154923f797/pone.0323377.g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/4d7ed16f6f09/pone.0323377.g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/61a774c646fb/pone.0323377.g023.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/39bf3bd82fd4/pone.0323377.g024.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/49c319ff5d2e/pone.0323377.g025.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/77d556eaa184/pone.0323377.g026.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/32472d1172dc/pone.0323377.g027.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/384fc5b311b0/pone.0323377.g028.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/0d4c044bec5a/pone.0323377.g029.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b59f10983a2b/pone.0323377.g030.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/68cfb0f11aab/pone.0323377.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/904c188f9208/pone.0323377.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/9a9b2bba0b39/pone.0323377.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/ca424aef8e6b/pone.0323377.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/2b2df45a9eba/pone.0323377.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b1ffaa673d37/pone.0323377.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/1f8c86f27902/pone.0323377.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/9fc4353a4978/pone.0323377.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/46829ffc2e2f/pone.0323377.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/64f4b621e023/pone.0323377.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/a06d3ca4721e/pone.0323377.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/bd23c372b3c1/pone.0323377.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/0cdc6c1df69d/pone.0323377.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/dca506298a39/pone.0323377.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/318deefa6765/pone.0323377.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/94590b8cd7f5/pone.0323377.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/a49e75a517d3/pone.0323377.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/2d87dfecedaa/pone.0323377.g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/c99cdb0cc1c9/pone.0323377.g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b0cc74e2694f/pone.0323377.g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/de154923f797/pone.0323377.g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/4d7ed16f6f09/pone.0323377.g022.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/61a774c646fb/pone.0323377.g023.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/39bf3bd82fd4/pone.0323377.g024.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/49c319ff5d2e/pone.0323377.g025.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/77d556eaa184/pone.0323377.g026.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/32472d1172dc/pone.0323377.g027.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/384fc5b311b0/pone.0323377.g028.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/0d4c044bec5a/pone.0323377.g029.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aeab/12151386/b59f10983a2b/pone.0323377.g030.jpg

相似文献

1
Research on APT groups malware classification based on TCN-GAN.基于TCN-GAN的高级持续性威胁(APT)组织恶意软件分类研究
PLoS One. 2025 Jun 10;20(6):e0323377. doi: 10.1371/journal.pone.0323377. eCollection 2025.
2
Convolution neural network with batch normalization and inception-residual modules for Android malware classification.基于批量归一化和 Inception-Residual 模块的卷积神经网络用于安卓恶意软件分类。
Sci Rep. 2022 Aug 17;12(1):13996. doi: 10.1038/s41598-022-18402-6.
3
End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware.用于自动分析国家恶意软件的端到端深度神经网络与迁移学习
Entropy (Basel). 2018 May 22;20(5):390. doi: 10.3390/e20050390.
4
Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.基于多尺度特征融合卷积神经网络的恶意代码变体识别。
Comput Intell Neurosci. 2021 Dec 14;2021:1070586. doi: 10.1155/2021/1070586. eCollection 2021.
5
GSB: GNGS and SAG-BiGRU network for malware dynamic detection.GSB:用于恶意软件动态检测的 GNGS 和 SAG-BiGRU 网络。
PLoS One. 2024 Apr 18;19(4):e0298809. doi: 10.1371/journal.pone.0298809. eCollection 2024.
6
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.基于卷积神经网络微调随机森林投票的物联网恶意软件新型检测与多分类方法。
Sensors (Basel). 2022 Jun 6;22(11):4302. doi: 10.3390/s22114302.
7
Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM.利用可解释深度学习推进恶意软件图像分类:一种使用SHAP、LIME和Grad-CAM的先进方法。
PLoS One. 2025 May 28;20(5):e0318542. doi: 10.1371/journal.pone.0318542. eCollection 2025.
8
Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN.基于Opcode2vec和CVAE-GAN的工业控制系统恶意软件识别方法
Sensors (Basel). 2024 Aug 26;24(17):5518. doi: 10.3390/s24175518.
9
Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework.网络物理系统中针对隐蔽恶意软件传播的动态防御:一个博弈论框架
Entropy (Basel). 2020 Aug 15;22(8):894. doi: 10.3390/e22080894.
10
DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model.DeepDetectNet 对抗 RLAttackNet:一种改进基于深度学习的静态恶意软件检测模型的对抗方法。
PLoS One. 2020 Apr 23;15(4):e0231626. doi: 10.1371/journal.pone.0231626. eCollection 2020.

本文引用的文献

1
Enhancing supervised analysis of imbalanced untargeted metabolomics datasets using a CWGAN-GP framework for data augmentation.使用CWGAN-GP框架进行数据增强,加强对不平衡非靶向代谢组学数据集的监督分析。
Comput Biol Med. 2025 Jan;184:109414. doi: 10.1016/j.compbiomed.2024.109414. Epub 2024 Nov 14.
2
Attribution classification method of APT malware based on multi-feature fusion.基于多特征融合的 APT 恶意软件归因分类方法。
PLoS One. 2024 Jun 27;19(6):e0304066. doi: 10.1371/journal.pone.0304066. eCollection 2024.
3
A Malicious Code Detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism.
一种基于堆叠深度可分离卷积和注意力机制的恶意代码检测方法。
Sensors (Basel). 2023 Aug 10;23(16):7084. doi: 10.3390/s23167084.
4
End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware.用于自动分析国家恶意软件的端到端深度神经网络与迁移学习
Entropy (Basel). 2018 May 22;20(5):390. doi: 10.3390/e20050390.