IDEAS home Printed from https://ideas.repec.org/a/aac/ijirss/v8y2025i1p2295-2304id4955.html
   My bibliography  Save this article

AI-enhanced cybersecurity: Machine learning classification application for APT malware attribution

Author

Listed:
  • Grozdan Hristov

Abstract

As technology becomes ever more integrated into daily tasks, the possibilities for conducting attacks against it increase as well. This gives rise to a number of challenges in the cybersecurity and technological fields. One such challenge is malware attribution, especially when it comes to determining the source and related threat actor of complex assaults. This article proposes a new machine learning-based method for Advanced Persistent Threat (APT) attribution that uses a dual-classifier system to predict the malware sample's nation of origin as well as the APT organization that is responsible for it. For the purpose of the research, the chosen dataset consists of roughly 3,500 tagged state-sponsored malware samples gathered from a variety of threat intelligence sources, containing information on malware hash values, malware family, connected country, etc. The model leverages static features extracted from the malware, including cryptographic hash values (MD5, SHA1, SHA256) and malware family labels, to build robust Random Forest classifiers. The choice of static analysis allows for efficient and scalable feature extraction, making the approach well-suited for large-scale datasets and real-time applications. The experimental results show an achievement for APT accuracy reaching 100% or very close to 100%, while the country accuracy was around 70%.

Suggested Citation

  • Grozdan Hristov, 2025. "AI-enhanced cybersecurity: Machine learning classification application for APT malware attribution," International Journal of Innovative Research and Scientific Studies, Innovative Research Publishing, vol. 8(1), pages 2295-2304.
  • Handle: RePEc:aac:ijirss:v:8:y:2025:i:1:p:2295-2304:id:4955
    as

    Download full text from publisher

    File URL: https://ijirss.com/index.php/ijirss/article/view/4955/763
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:8:y:2025:i:1:p:2295-2304:id:4955. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.