Preprint Article Version 1 This version is not peer-reviewed

Understanding APT Detection Using Machine Learning Algorithms: Is Superior Accuracy a Thing

Version 1 : Received: 13 July 2024 / Approved: 15 July 2024 / Online: 15 July 2024 (11:02:17 CEST)

How to cite: CHRISTOPHER, G.; Arefin, S. Understanding APT Detection Using Machine Learning Algorithms: Is Superior Accuracy a Thing. Preprints 2024, 2024071152. https://doi.org/10.20944/preprints202407.1152.v1 CHRISTOPHER, G.; Arefin, S. Understanding APT Detection Using Machine Learning Algorithms: Is Superior Accuracy a Thing. Preprints 2024, 2024071152. https://doi.org/10.20944/preprints202407.1152.v1

Abstract

Advanced Persistent Threats (APTs) are sophisticated cyberattacks aimed at stealing sensitive information or causing damage over an extended period. Detecting APTs is crucial for maintaining cybersecurity, and machine learning (ML) has emerged as a powerful tool in this domain. This paper explores the role of ML algorithms in detecting APTs, comparing their accuracy and effectiveness. We evaluate various algorithms, discuss the challenges in achieving superior accuracy, and suggest strategies for improvement. Our findings highlight the potential and limitations of ML in APT detection, emphasizing the need for continuous advancements in this field.

Keywords

Background on Advanced Persistent Threats (APTs)Advanced Persistent Threats (APTs) represent a significant cybersecurity challenge due to their stealthy nature and prolonged duration. Unlike traditional cyberattacks, APTs are characterized by their persistence, as attackers remain undetected within networks for extended periods, often months or years. This persistence allows attackers to steal sensitive data, disrupt operations, or cause significant damage. 

Subject

Computer Science and Mathematics, Artificial Intelligence and Machine Learning

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.