DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence
By: Dincy R Arikkat , Vinod P. , Rafidha Rehiman K. A. and more
Potential Business Impact:
Helps phones spot sneaky apps by their actions.
The widespread adoption of Android devices for sensitive operations like banking and communication has made them prime targets for cyber threats, particularly Advanced Persistent Threats (APT) and sophisticated malware attacks. Traditional malware detection methods rely on binary classification, failing to provide insights into adversarial Tactics, Techniques, and Procedures (TTPs). Understanding malware behavior is crucial for enhancing cybersecurity defenses. To address this gap, we introduce DroidTTP, a framework mapping Android malware behaviors to TTPs based on the MITRE ATT&CK framework. Our curated dataset explicitly links MITRE TTPs to Android applications. We developed an automated solution leveraging the Problem Transformation Approach (PTA) and Large Language Models (LLMs) to map applications to both Tactics and Techniques. Additionally, we employed Retrieval-Augmented Generation (RAG) with prompt engineering and LLM fine-tuning for TTP predictions. Our structured pipeline includes dataset creation, hyperparameter tuning, data augmentation, feature selection, model development, and SHAP-based model interpretability. Among LLMs, Llama achieved the highest performance in Tactic classification with a Jaccard Similarity of 0.9583 and Hamming Loss of 0.0182, and in Technique classification with a Jaccard Similarity of 0.9348 and Hamming Loss of 0.0127. However, the Label Powerset XGBoost model outperformed LLMs, achieving a Jaccard Similarity of 0.9893 for Tactic classification and 0.9753 for Technique classification, with a Hamming Loss of 0.0054 and 0.0050, respectively. While XGBoost showed superior performance, the narrow margin highlights the potential of LLM-based approaches in TTP classification.
Similar Papers
BERTDetect: A Neural Topic Modelling Approach for Android Malware Detection
Cryptography and Security
Finds bad apps by reading their descriptions.
An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
Cryptography and Security
Finds hidden computer attacks and explains them clearly.
A Systematic Approach to Predict the Impact of Cybersecurity Vulnerabilities Using LLMs
Cryptography and Security
Finds how hackers exploit computer flaws.