Open Access iconOpen Access

ARTICLE

crossmark

Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework

Jong-Yih Kuo1, Ping-Feng Wang2,*, Ti-Feng Hsieh1,*, Cheng-Hsuan Kuo1

1 Department of Computer Science and Information Engineering, National Taipei University of Technology, Taipei, 106344, Taiwan
2 Department of Artificial Intelligence and Computer Engineering, National Chin-Yi University of Technology, Taichung, 411030, Taiwan

* Corresponding Authors: Ping-Feng Wang. Email: email; Ti-Feng Hsieh. Email: email

Computer Modeling in Engineering & Sciences 2025, 143(3), 3133-3166. https://doi.org/10.32604/cmes.2025.064104

Abstract

In recent years, cyber threats have escalated across diverse sectors, with cybercrime syndicates increasingly exploiting system vulnerabilities. Traditional passive defense mechanisms have proven insufficient, particularly as Linux platforms—historically overlooked in favor of Windows—have emerged as frequent targets. According to Trend Micro, there has been a substantial increase in Linux-targeted malware, with ransomware attacks on Linux surpassing those on macOS. This alarming trend underscores the need for detection strategies specifically designed for Linux environments. To address this challenge, this study proposes a comprehensive malware detection framework tailored for Linux systems, integrating dynamic behavioral analysis with the semantic reasoning capabilities of large language models (LLMs). Malware samples are executed within sandbox environments to extract behavioral features such as system calls and command-line executions. These features are then systematically mapped to the MITRE ATT&CK framework, incorporating its defined data sources, data components, and Tactics, Techniques, and Procedures (TTPs). Two mapping constructs—Conceptual Definition Mapping and TTP Technical Keyword Mapping—are developed from official MITRE documentation. These resources are utilized to fine-tune an LLM, enabling it to semantically interpret complex behavioral patterns and infer associated attack techniques, including those employed by previously unknown malware variants. The resulting detection pipeline effectively bridges raw behavioral data with structured threat intelligence. Experimental evaluations confirm the efficacy of the proposed system, with the fine-tuned Gemma 2B model demonstrating significantly enhanced accuracy in associating behavioral features with ATT&CK-defined techniques. This study contributes a fully integrated Linux-specific detection framework, a novel approach for transforming unstructured behavioral data into actionable intelligence, improved interpretability of malicious behavior, and a scalable training process for future applications of LLMs in cybersecurity.

Keywords

Linux malware; dynamic analysis; behavior analysis; behavioral feature; ATT&CK; sandbox; large language model; fine-tuning

Cite This Article

APA Style
Kuo, J., Wang, P., Hsieh, T., Kuo, C. (2025). Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework. Computer Modeling in Engineering & Sciences, 143(3), 3133–3166. https://doi.org/10.32604/cmes.2025.064104
Vancouver Style
Kuo J, Wang P, Hsieh T, Kuo C. Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework. Comput Model Eng Sci. 2025;143(3):3133–3166. https://doi.org/10.32604/cmes.2025.064104
IEEE Style
J. Kuo, P. Wang, T. Hsieh, and C. Kuo, “Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework,” Comput. Model. Eng. Sci., vol. 143, no. 3, pp. 3133–3166, 2025. https://doi.org/10.32604/cmes.2025.064104



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1249

    View

  • 624

    Download

  • 0

    Like

Share Link