How machine learning helps fight advanced persistent threats

Project Sauron was one such sophisticated form of malware which went undetected for seven years

Picture: Christiaan Colen (Flickr)

Picture: Christiaan Colen (Flickr)

Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They routinely evade traditional security systems and steal confidential corporate information without a trace.

Project Sauron was one such sophisticated form of malware which went undetected for seven years. Taking advantage of zero-day vulnerabilities, a security hole in software unknown to the vendor, it stole data from internet-segregated computers at 30 organisations worldwide. The attackers understood that researchers look for patterns so they removed them making it far harder to discover.

More algorithms, more accuracy

Being so complex, targeted malware like Project Sauron usually displays different behaviours found on several malware samples. So, to secure a high detection rate, security vendors correlate results from multiple algorithms.

At Bitdefender we’ve been training algorithms for years - Perceptrons, Neural Networks, Centroids, Binary Decision Tree and Deep Learning – to name but a few. Some algorithms are specialised on specific malware families, some on new malicious files and some are built to minimise the number of false positives. They complement each other, as well as traditional heuristic and signature-based detection.

Detecting suspicious network traffic

Detecting zero-days starts with the assumption that the activity on an endpoint in an enterprise environment has a predictable behaviour. So identification of any suspicious activity should begin with an analysis of typical network behaviour.

Machine learning can help process millions of data points every minute to establish a “normal” baseline, comparing data points to past behaviour, and identifying anomalous differences in values, over time. Using this technology, transactions, server processes, internet traffic, IPS alerts and proxy logs can be analysed for unusual activities.

Neural networks to filter URLs

Malware also has the ability to hide in a multiple-layered proxy network and to use evasion techniques capable of providing new binaries at every access.

Therefore, detecting an APT attack includes network-based filtering. Since a malicious URL is often accessible only for a couple of minutes, this method is only efficient if associated with a cloud-based service, so as to update the list of domains and malicious URLs into everyone's computers as fast as possible.

The days of classic URL blacklisting-whitelisting are long gone due to the sophisticated evasion techniques of APTs which require ever more complex, dynamic techniques to block malicious attacks on the internet.

One example is by using unsupervised machine learning techniques, security experts can cluster URLs or domains to identify DGAs (domain generation algorithms), which have been used by malware creators to generate domains that act as rendezvous points with the command and control servers.

Clustering partitions a data set into homogeneous groups based on given features. It seeks to structure unlabelled volumes of data into groups with shared properties. Clustering algorithms has to be fast (suitable for big data sets), generic (to be able to overcome obfuscation), as well as specific (a cluster must contain similar samples).

For every URL, a special hash is computed using a URL fingerprint. When an URL is being analysed, the system will try to classify it using different algorithms, each with its own rate, resulting in two groups of algorithms (the ones that label the URL clean and the ones that label it as malicious). Then, the clustering system decides whether the fingerprint is malicious or not, using a vote system. The scores obtained for each fingerprint function are summed up to obtain the final score and, based on the results, the URL is signalled as clean or malicious.

Sorting email spam

APTs can often take advantage of zero-day exploits in frequently used applications. Most of the time, the user has to visit a malicious page or open an infected document sent via e-mail. So, identifying malware-infected emails is still key in cyber-defence.

A trained machine learning algorithm can decide whether emails are spam based on rules it learns from pre-classified samples.

To quickly and accurately identify spam, Bitdefender uses local and cloud-based detection techniques to analyse SMTP connection information (sender IP address/sender domain), email header information, content information (text fingerprints, URLs, phone numbers, images, attachments etc.). The filters used for analysing this data interact with each other to cover various scenarios and variants of already-detected spam waves.

The future doesn’t stay still

Once the domain of high profile organisations, APTs are now becoming more common in far smaller companies. This heightens the need for companies of all sizes to ensure they engage rigorous security measures with multi-layer fraud prevention to defend both against today’s attacks and those that have yet to appear.

Gavrilut Dragos isAntimalware Research Manager at BitDefender

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags businessmalware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gavrilut Dragos

PC World
Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?