{"title":"Dual-SPIR model for predicting APT malware spread in organization networks","authors":"Hai Anh Tran , Xuan Cho Do , Thanh Thuy Nguyen","doi":"10.1016/j.compeleceng.2025.110214","DOIUrl":null,"url":null,"abstract":"<div><div>Modeling the spread of Advanced Persistent Threat (APT) malware in systems is currently an important task. Several compartmental models have been proposed, and they have shown some effectiveness, indicating this is a promising research direction. However, these approaches still face some key challenges, including: i) they have not yet fully modeled the lifecycle and processes of APT malware; ii) they have not yet calculated or identified the influence of environmental factors on predicting the malware spread. To address these two issues, this paper introduces a new model called a Dual Susceptible-Protected-Infected-Recovered (Dual-SPIR) model. For the first issue, the proposed Dual-SPIR model will be a two-layer model that represents the spread, privilege escalation, and data theft process of APT malware. To address the second issue, this research proposes three main factors that affect the spread of APT malware, including: i) the behavior of the malware; ii) the security technologies used by the system; and iii) system vulnerabilities. The Dual-SPIR model will calculate the impact of these three factors on the spread of APT malware within the system. Specifically, for malware behavior, we suggest using the MITRE ATT&CK Framework, which is currently one of the best tools for defining APT attack strategies and tactics. For system protection, we selected antivirus software, a widely used tool by organizations to protect their systems from APT campaigns. Lastly, for system vulnerabilities, the research focuses on office software vulnerabilities in the Windows 10 operating system. Different scenarios have shown that the Dual-SPIR model in this paper performs better than other approaches across all evaluation metrics. This demonstrates that the research not only has academic value but also practical relevance, as it successfully combines three key factors to model the spread of APT malware within systems.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"123 ","pages":"Article 110214"},"PeriodicalIF":4.0000,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625001570","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Modeling the spread of Advanced Persistent Threat (APT) malware in systems is currently an important task. Several compartmental models have been proposed, and they have shown some effectiveness, indicating this is a promising research direction. However, these approaches still face some key challenges, including: i) they have not yet fully modeled the lifecycle and processes of APT malware; ii) they have not yet calculated or identified the influence of environmental factors on predicting the malware spread. To address these two issues, this paper introduces a new model called a Dual Susceptible-Protected-Infected-Recovered (Dual-SPIR) model. For the first issue, the proposed Dual-SPIR model will be a two-layer model that represents the spread, privilege escalation, and data theft process of APT malware. To address the second issue, this research proposes three main factors that affect the spread of APT malware, including: i) the behavior of the malware; ii) the security technologies used by the system; and iii) system vulnerabilities. The Dual-SPIR model will calculate the impact of these three factors on the spread of APT malware within the system. Specifically, for malware behavior, we suggest using the MITRE ATT&CK Framework, which is currently one of the best tools for defining APT attack strategies and tactics. For system protection, we selected antivirus software, a widely used tool by organizations to protect their systems from APT campaigns. Lastly, for system vulnerabilities, the research focuses on office software vulnerabilities in the Windows 10 operating system. Different scenarios have shown that the Dual-SPIR model in this paper performs better than other approaches across all evaluation metrics. This demonstrates that the research not only has academic value but also practical relevance, as it successfully combines three key factors to model the spread of APT malware within systems.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.