How machine learning helps fight advanced persistent threats

Project Sauron was one such sophisticated form of malware which went undetected for seven years

Picture: Christiaan Colen (Flickr)

Picture: Christiaan Colen (Flickr)

Advanced Persistent Threats (APTs) are the plague of enterprise security, crippling businesses and IT careers through costly data breaches and massive losses. Their goal is to steal intellectual property, and confidential company information. They routinely evade traditional security systems and steal confidential corporate information without a trace.

Project Sauron was one such sophisticated form of malware which went undetected for seven years. Taking advantage of zero-day vulnerabilities, a security hole in software unknown to the vendor, it stole data from internet-segregated computers at 30 organisations worldwide. The attackers understood that researchers look for patterns so they removed them making it far harder to discover.

More algorithms, more accuracy

Being so complex, targeted malware like Project Sauron usually displays different behaviours found on several malware samples. So, to secure a high detection rate, security vendors correlate results from multiple algorithms.

At Bitdefender we’ve been training algorithms for years - Perceptrons, Neural Networks, Centroids, Binary Decision Tree and Deep Learning – to name but a few. Some algorithms are specialised on specific malware families, some on new malicious files and some are built to minimise the number of false positives. They complement each other, as well as traditional heuristic and signature-based detection.

Detecting suspicious network traffic

Detecting zero-days starts with the assumption that the activity on an endpoint in an enterprise environment has a predictable behaviour. So identification of any suspicious activity should begin with an analysis of typical network behaviour.

Machine learning can help process millions of data points every minute to establish a “normal” baseline, comparing data points to past behaviour, and identifying anomalous differences in values, over time. Using this technology, transactions, server processes, internet traffic, IPS alerts and proxy logs can be analysed for unusual activities.

Neural networks to filter URLs

Malware also has the ability to hide in a multiple-layered proxy network and to use evasion techniques capable of providing new binaries at every access.

Therefore, detecting an APT attack includes network-based filtering. Since a malicious URL is often accessible only for a couple of minutes, this method is only efficient if associated with a cloud-based service, so as to update the list of domains and malicious URLs into everyone's computers as fast as possible.

The days of classic URL blacklisting-whitelisting are long gone due to the sophisticated evasion techniques of APTs which require ever more complex, dynamic techniques to block malicious attacks on the internet.

One example is by using unsupervised machine learning techniques, security experts can cluster URLs or domains to identify DGAs (domain generation algorithms), which have been used by malware creators to generate domains that act as rendezvous points with the command and control servers.

Clustering partitions a data set into homogeneous groups based on given features. It seeks to structure unlabelled volumes of data into groups with shared properties. Clustering algorithms has to be fast (suitable for big data sets), generic (to be able to overcome obfuscation), as well as specific (a cluster must contain similar samples).

For every URL, a special hash is computed using a URL fingerprint. When an URL is being analysed, the system will try to classify it using different algorithms, each with its own rate, resulting in two groups of algorithms (the ones that label the URL clean and the ones that label it as malicious). Then, the clustering system decides whether the fingerprint is malicious or not, using a vote system. The scores obtained for each fingerprint function are summed up to obtain the final score and, based on the results, the URL is signalled as clean or malicious.

Sorting email spam

APTs can often take advantage of zero-day exploits in frequently used applications. Most of the time, the user has to visit a malicious page or open an infected document sent via e-mail. So, identifying malware-infected emails is still key in cyber-defence.

A trained machine learning algorithm can decide whether emails are spam based on rules it learns from pre-classified samples.

To quickly and accurately identify spam, Bitdefender uses local and cloud-based detection techniques to analyse SMTP connection information (sender IP address/sender domain), email header information, content information (text fingerprints, URLs, phone numbers, images, attachments etc.). The filters used for analysing this data interact with each other to cover various scenarios and variants of already-detected spam waves.

The future doesn’t stay still

Once the domain of high profile organisations, APTs are now becoming more common in far smaller companies. This heightens the need for companies of all sizes to ensure they engage rigorous security measures with multi-layer fraud prevention to defend both against today’s attacks and those that have yet to appear.

Gavrilut Dragos isAntimalware Research Manager at BitDefender

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags businessmalware

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gavrilut Dragos

PC World
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?