• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    2021-12-16 07:51:48YussufAhmedTaufiqAsyhariandMdArafaturRahman
    Computers Materials&Continua 2021年5期

    Yussuf Ahmed,A.Taufiq Asyhari and Md Arafatur Rahman

    1School of Computing and Digital Technology,Birmingham City University,Birmingham,UK

    2Faculty of Computing,IBM CoE,ERAS,University Malaysia Pahang,Pahang,Malaysia

    Abstract:The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks.This is primarily due to the sophistication of the attacks and the availabilityof powerful tools.Interconnected devices such as the Internet of Things(IoT)are also increasing attack exposures due to the increase in vulnerabilities.Over the last few years,we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks.Edge technology brings processing power closer to the network and brings many advantages,including reduced latency,while it can also introduce vulnerabilities that could be exploited.Smart cities are also dependent on technologies where everything is interconnected.This interconnectivity makes them highly vulnerable to cyber-attacks,especially by the Advanced Persistent Threat (APT),as these vulnerabilities are amplified by the need to integrate new technologies with legacy systems.Cybercriminals behind APT attacks have recently been targeting the IoT ecosystems,prevalent in many of these cities.In this paper,we used a publicly availabledataset on Advanced Persistent Threats(APT)and developed a data-driven approach for detecting APT stages using the Cyber Kill Chain.APTs are highly sophisticated and targeted forms of attacks that can evade intrusion detection systems,resulting in one of the greatest current challenges facing security professionals.In this experiment,we used multiple machine learning classifiers,such as Na?ve Bayes,Bayes Net,KNN,Random Forest and Support Vector Machine (SVM).We used Weka performance metrics to show the numeric results.The best performance result of 91.1%was obtained with the Na?ve Bayes classifier.We hope our proposed solution will help security professionals to deal with APTs in a timely and effective manner.

    Keywords:Advanced persistent threat;APT;Cyber Kill Chain;data breach;intrusion detection;cyber-attack;attack prediction;data-driven security and machine learning

    1 Introduction

    1.1 Background and Motivation

    In the last few years,we have seen the growth in the scale and complexity of cyber-attacks targeting organizations.A global report by IBM [1]showed that the average cost of a cyber-breach was found to be $3.86 million.One of the most sophisticated attacks utilized by cybercriminals is Advanced Persistent Threat (APT),whose goal is to gain unauthorized access,maintain a foothold and exfiltrate or modify data.APTs are targeted and persistent forms of attack and may go unnoticed for an extended timescale [2].According to FireEye,the global median dwell time of APT attacks is 56 days [3].APT attackers often use multiple attack vectors to obtain or modify the information,which is even made easier by the ever-expanding attack surface in the digitized world.For example,cybercriminals could exploit devices ranging from the Internet of Things (IoT),smart cameras,and Bring Your Own Devices (BYOD),which are present in most organizations.

    In recent times we have also observed a remarkable increase in the number of remote users due to the Covid19 pandemic.Cybercriminals are using every opportunity to take advantage of this surge in remote working.They employ techniques such as phishing attacks to exploit unsuspecting users and to compromise previously secure networks.Attackers could also exploit internet-facing open ports on home routers with default credentials to compromise the remote users,causing a cascading effect on the infrastructure using the stolen credentials.According to a recent report by a leading UK Privileged Access Management (PAM) provider [4],71% of the surveyed decision-makers believed the arrangement of remote working during the Covid-19 pandemic magnified the probability of a cyber-breach.APT attacks are mostly utilized by organized cyber criminals but there are also large security breaches linked to nation-state actors with the aims of espionage and attacks on national critical infrastructure.

    According to a Verizon Data Breach Investigation Report [5],there was an increase in cyber espionage involving APTs using a combination of phishing and malware.According to another report by Malwarebytes [6],organized criminals and nation-state actors linked APT groups have been using coronavirus-based phishing attacks to compromise and gain a foothold on the victim machines [7].The attack vectors used include template injection,malicious macros,and linked files,while others have used malicious attachments supposedly containing Covid19 prevention measures [8].

    Recent interests have shown an increased focus to deal with APT attacks.A variety of cybersecurity measures and methodologies have been investigated to detect,monitor,and mitigate the APTs,and their impacts.Conventional cybersecurity approaches have demonstrated some limited success at detecting APTs due to their sophistication,and when they are detected,they tend to adapt very quickly and change course.Most of the APT groups are well resourced and will try every effort to achieve their goal.These motivate the recent development of machine learning and computational intelligence techniques to improve the detection of the APTs,which can then translate into timely intervention measures.

    1.2 Our Contributions

    While several predecessor works have investigated machine learning for APT detection and mitigation,there have been various shortcomings in their effectiveness for wider uses.These include:(i) a lack of reliable publicly-open APT datasets,(ii) a lack of alignment with Industryinformed practice on the available dataset construction,(iii) limited experimental works to evaluate the learning algorithm effectiveness.This work proposes to advance the machine learning application for APT detection by addressing the latter two shortcomings from the previous works.Our main contributions include:

    ? Building upon a recently proposed APT dataset in [9],we leverage an industry-informed framework of Cyber Kill Chain to reconstruct a dataset that captures realistic APT stages.Through this dataset reconstruction,we employ data intelligence via machine learning that exploits possible patterns within the reconstructed dataset.

    ? Given the limited number of features in the original APT dataset,we perform feature extraction via multi-factor analysis (MFA) that creates abstract features to provide options for training machine learning models in the APT stage detection and classification.

    ? To improve the classification accuracy,we investigate feature selection techniques to remove noisy and less relevant features for APT stage detection and classification.A different number of selected features are assessed to provide optimal tuning to the overall machine learning models.

    ? Using baseline machine learning classifiers,we perform in-depth and rigorous analysis of the experimental results and assess the trade-off of the classifiers’performance using a variety of performance metrics.

    This work improves the work in [9]by using the industry-informed Cyber Kill Chain approach for dataset reconstruction for enhancing the resolution on the attack stages and alert types,which are critical in the APT attack analysis.To prevent a direct linkage between an attack stage and an alert type as found in [9],we carefully refine the alerts grouping with one alert possibly corresponding to multiple attack stages as informed by the APT lifecycle within the Cyber Kill Chain framework.This may inevitably reduce the ability to perform accurate stage classification.For improving the APT detection accuracy,we conduct feature extraction and selection before APT stage classification.For the subsequent sections of the paper,we will refer to the work in [9]as the APT dataset provider.

    The rest of this paper is organized as follows.Section 2 discusses closely related works and how they shape our current work.Section 3 applies the Cyber Kill Chain to cybersecurity data modeling.Section 4 discusses our machine learning construction to classify the APT attack stages based on the Cyber Kill Chain informed data model.Section 5 explains the experiments to validate the effectiveness of the machine learning model covered in Section 4.Section 6 concludes the paper by highlighting important points in this work and setting up future research direction.

    2 Related Work

    Most of the information available on APTs is from the industry,although some research was carried out in the academic circles.The extensive research by industry leaders such as FireEye [10]and Kaspersky [11]led to the discovery of many APTs,including those used by nation-state actors that are difficult to detect.For example,FireEye published research on APT41,which is linked to nation-state actors and used for espionage and financial gains [12].Several industry leaders proposed attack Life Cycle frameworks for dealing with cyber threats.These frameworks include the Lockheed Martin Cyber Kill Chain,the Diamond model,Mandiant Attack Life Cycle,and MITRE ATT&CK model.

    The Lockheed Martin Cyber Kill Chain has seven stages covering the whole attack life cycle and is the primary focus of our research.The Diamond model is another approach for detecting intrusion and has four interconnected features that are present in every attack.These features are adversary,capability,infrastructure,and victim.The Mandiant attack life cycle consists of multiple components mapped to the various phases of the attack life cycle.The industry research has its own limitations,given they are not peer-reviewed and are mostly used as a platform to market their products.APT attacks have also been gaining interest from academic researchers,and several authors have published articles on this subject.In [13],the authors surveyed APTs and proposed a taxonomy for APT defense classification.Similarly,[14]carried a survey on APTs and reviewed some of the known APT groups’activities but did not cover defensive or detective technical measures.This work mostly relied on publicly available data on APTs shared by the industry,although they described such sources’limitations.

    Another APT attack life cycle methodology was proposed in [15].The authors proposed four stages which were,prepare,access,resident,and harvest.In the preparation stage,the attackers gather information relating to the target.The access and harvest stages broadly encompass the step involved in compromising the target.According to the authors,the most common attack vectors for APT include watering hole and spearfishing.In [16],the authors discussed the tools and techniques available to the attackers and linked them to the various stages of the Cyber Kill Chain,but the review was more generic.It could have benefited from evaluating certain APT attacks or groups.Similarly,in [17],the author proposed a taxonomy for banking Trojans based on the Cyber Kill Chain.In another work [18],the authors leveraged the Cyber Kill Chain to break-down complex attacks and built a picture of the APT attackers’tactics,techniques,and procedures (TTPs).The authors analyzed over 40 APTs to build their proposed taxonomy.

    As mentioned in Section 1,the original APT dataset provider proposed a machine learningbased framework for APT detection and proposed six APT steps;however,they only considered four of these as detectable APT attack stages.These stages are (i) Point of entry,(ii) C&C communication,(iii) Asset/data recovery,(iv) Data exfiltration.Their MLAPT framework consists of three phases:threat detection,alert correlation,and attack detection.Their proposed detection modules are Disguised exe File Detection (DeFD),Malicious File Hash Detection (MFHD),Malicious Domain Name Detection (MDND),Malicious IP Address Detection (MIPD),Malicious SSL Certificate Detection (MSSLD),Scanning Detection (SD) and Tor Connection Detection(TorCD) as in Fig.1.

    In [19],the authors proposed an approach for detecting APT using fractal methods based on ak-NN algorithm,which,according to the authors,resulted in a reduction in false positives and false negatives.In a similar report [20],the authors performed experiments to detect the stages of APT attacks.They used the NSL-KDD dataset and selected Principal Component Analysis(PCA) for feature sampling.

    In [21],the author categorized the APT attack lifecycle into five phases:reconnaissance,compromise,maintaining access,lateral movement,and data exfiltration.In [22],the authors categorized APT phases into reconnaissance,delivery,exploitation,operation,data collection,and exfiltration and proposed an APT detection methodology.

    Reference [23]studied a conceptual framework for APT detection,building on the work by the APT dataset provider.Their proposed solution is a work in progress and did not contain experiments and results to demonstrate their proposed framework’s effectiveness.We differ from their work significantly because we performed experiments using the APT dataset,reconstructed the dataset,and performed feature extraction,feature selection,and classification along with detailed analysis of the results.

    Figure 1:The architecture of MLAPT [9]alongside our work

    Despite the recent progress in APT research,the existing works are mostly hampered by the lack of datasets on APT.Most of the current research relies on old datasets that might not reflect on the current sophistication of the attacks.There are few initiatives for sharing data,such as the Veris framework [24]but even then,the data could be heavily anonymized.Furthermore,there is limited experimental evidence of explicit association and linkage between existing APT datasets and the corresponding machine learning with the Cyber Kill Chain data modeling.

    In this research,we attempt to address these aforementioned technical gaps by reconstructing the recently proposed APT dataset,as mentioned in Section 1,through the Cyber Kill Chain modeling and mapping approach.Based on the reconstructed dataset,we next design and develop machine learning models to intelligently learn from the dataset.We then conduct rigorous experiments and analysis of the results to gain insights into the accuracy of the machine learning models and other relevant performance metrics.This work can provide a foundation for future provisioning of automated APT detection and classification with minimized human intervention.

    3 Cyber Kill Chain Informed Modelling

    The Cyber Kill Chain consists of seven stages,as described in the previous section.In this section,we are going to build on the work by the previous authors.We will reconstruct the data and map the detection alerts to the stages of the Cyber Kill Chain.We will then perform feature extraction and selection to enhance the accuracy of the stage detection model.Fig.3 shows the APT stages proposed by the original dataset providers alongside our work based on the Cyber Kill Chain.We are building on their work to improve the overall detection accuracy.The methodology proposed by the earlier authors covers six stages,as described in Section 2.Our first step was to map their proposed APT stages and detection methods to the Cyber Kill Chain.

    Fig.3 depicts that their stages and detection modules fall within the delivery,command &control,and action on objectives stages of the CKC.Their point of entry stage,which corresponds to the delivery stage of CKC,is broad and can be matched to the other stages.However,in our opinion,it is more suitable for the delivery stage of the CKC given this was considered the initial point of compromise.We will briefly discuss each of the seven CKC stages and assign detection modules,including those proposed by the APT dataset provider and others from our proposed work.

    3.1 Reconnaissance Detection

    Reconnaissance,which is also referred to as information gathering,is the first stage of carefully planned cyber-attacks.The two main types of reconnaissance techniques are active and passive reconnaissance.In passive reconnaissance,the attacker has no direct interactions with the target,while in active reconnaissance,the intruder interacts with the target to obtain information that could be used during the later stages.

    Although there is no detection module for the reconnaissance stage in the framework proposed by the original APT dataset provider and no observations relating to this stage in the dataset,we believe this is crucial for detecting cyber-attacks in the early stages.We want to follow this up in our future work and plan to build a detection module.Our proposed detection methods for this stage include:(i) OS fingerprinting [25],(ii) Port scanning [25],(iii) Alerts on robot.txt access which can reveal restricted paths [26],(iv) DNS enumeration [27],(v) DNS honey tokens [28].

    3.2 Weaponization Detection

    Attackers use the information gathered during the reconnaissance stage to create a carefully crafted malicious payload tailored to meet their requirements.The attackers usually use automated tools for packaging their malware.Remote Access Trojan (RAT) and exploits are used during the weaponization.

    The original APT dataset provider’s work did not create a detection module for this stage in their framework,given the attackers will not be interacting with the target system at this stage.We agree with the authors and have not assigned any alert to this stage in our CKC informed model.

    3.3 Delivery Detection

    Malicious actors deploy a weaponized payload to the target during the delivery stage.There are multiple means for payload delivery available to the attackers,including malicious emails,click-by downloads,watering hole [29],or infected USB devices [30].The authors of the original APT dataset called it the point of entry in their proposed APT lifecycle.They used the detection methods in Fig.3.to detect their APT steps.However,we expanded it further,considering some of the sophisticated APT attacks,such as Stuxnet,were delivered using infected USB sticks [30].We added infected USB drives,malicious links [31],and injection attacks [32]to the list of alerts in our proposed detection methods,and we plan to build a detection module.

    3.4 Exploitation Detection

    To be able to execute a malicious payload successfully,a vulnerability must exist on the target system.This could be a known vulnerability or zero-day exploit.Security metrics such as Mean Time to Patch (MTT) could measure the response times for patching the vulnerabilities and reduce the window of opportunity for cybercriminals.In the work by the APT dataset provider,the authors did not directly specify a detection module and alerts for the exploitation stage,although their point of entry stage may overlap with this stage.In this stage,we used two alerts from the original authors and added three of our own,namely:(i) Brute force detection,(ii) Pass hash detection alerts,(iii) Task schedule,(iv) Scripting,(v) PowerShell [33].

    3.5 Installation

    The attackers execute the malware during this stage.To avoid detection,they often use a dropper and downloaders to disable the security monitoring tools such as anti-virus to avoid detection during the malware installation [34].In this stage,we used one alert from the detection methods proposed by the APT dataset provider.We added a further two alerts:privilege escalation and injection attack alerts,as shown in Fig.3.

    3.6 Command and Control(C2)

    Attackers get management control of the target and establish a backdoor to maintain persistent access.In this stage,we used the detection methods proposed by the original APT dataset provider,which are:(i) Malicious IP address,(ii) Malicious SSL certificate,(iii) Malicious domain flux detection.

    3.7 Action on Objectives

    This refers to the final part of the Cyber Kill Chain.We mapped it to the lateral movement,asset/data discovery and data exfiltration stages proposed by the APT dataset provider.The authors used Tor connection alerts and scanning as their detection methods.We added DNS tunneling detection [35]and want to create a detection module in our future work.We also added internal reconnaissance as a subcategory for this stage.Hackers can use Internal reconnaissance or lateral movement to find valuable assets [36].

    4 APT Stage Classification Models

    This model’s primary goal is to improve APT detection accuracy using a Cyber Kill Chain approach and leveraging data-driven intelligence.To achieve this research’s objectives,we used a publicly available dataset on APT shared by the original APT dataset provider.Most of the features in the dataset were categorical data except the numerical timestamp.The original dataset consists of 8 features,1 label,and 3676 observations.These features are alert id,alert type,timestamp,source IP,source port,destination IP,destination port,and infected host,with the last entry being steps that represent the label.To evaluate the prediction model,we prepared the dataset,performed feature extraction,feature selection,attack stage classification,and then saved the model.In the next part,we are going to explain how we prepared the dataset.

    4.1 Preparing the Dataset

    The original dataset consists of 8 features and 3676 observations mapped to a label comprising 6 APT stages proposed by the authors.In Section 3,we discussed the attack modules and alerts proposed in their MLAPT framework.We then mapped their detection modules and our proposed detection methods to the CKC stages,as shown in Fig.3.We reconstructed the dataset,performed feature extraction and selection during the dataset preparation stage,as shown in Fig.2.In the next part,we are going to explain our feature extraction and selection processes.

    Figure 2:Data preparation and classification

    Figure 3:APT alerts mapped to the CKC,demonstrating state-of-the-art assignment with experimental machine learning and comparison with our work

    4.2 Feature Extraction

    Feature extraction represents the task of obtaining a set of features from sample data and enhancing the classifier’s performance [37].In our experiment,we considered several feature extraction methods,including Principal Component Analysis (PCA),Multiple Correspondence Analysis (MCA),and Multiple Factor Analysis (MFA).PCA denotes a method for reducing large datasets dimensionality while minimizing information loss using linear combinations (weight average) of a set of variables [38].MCA is another statistical technique best suited for tables with individuals described by several qualitative variables [39].MFA is a PCA variation,making it possible to analyze more than one data table representing a group of variables collected on the same observations [40].Given this dataset contains both qualitative and quantitative variables,we selected MFA as our feature extraction methods.

    4.3 Feature Selection

    Feature selection refers to selecting only the most important features based on their ranking to reduce complexity,remove noise,and increase the model’s efficiency.The feature selection process’s objective is to build a less complex but comprehensive model without compromising accuracy [41]by removing redundant or less relevant futures.In our case,we selected Information Gain (IG),Gain Ratio (GR),and OneR as the feature selection methods,as shown in Tab.3.The main reason for selecting these methods is that they all provide scores and rank features according to their relevance.

    4.4 Attack Stage Classifiers

    We applied a set of classifiers to the training data.Many supervised learning algorithms are widely adopted for classification,and they include Naive Bayes,Support Vector Machine(SVM),Random Forest,k-NN,Decision trees,and linear classifiers.We used the Weka machine learning tool to perform our classification.In our experiment,we used the following classification algorithms.

    4.4.1 Na?ve Bayes

    The Na?ve Bayesian classifier is an algorithm that leverages posterior probability for classification [42].Suppose we haveP(B|D)andP(D|B)as the probability of B given D and vice-versa,P(B)andP(D)denote the likelihoods of B and D,respectively.These parameters can be linked through a Bayesian equation as follows.

    Using this,one can construct a classifier using a maximum posterior probability rule gained from a dataset [42],i.e.,

    whereCkare label instances in the dataset,xiare data points (instances) andis the estimated label.In our case,the classesCkrefer to our CKC stages whilexirefer to data instances of the features.

    4.4.2 Bayes Net

    The Bayes Net,also known as Bayesian Belief Network (BNN),is a classifier that models the relationship between features in a more generic way.Bayes Net may be employed as a classifier that gives the posterior probability distribution of the classification node provided by the other attribute’s value [43].It is a graphic description of conditional probabilities.

    4.4.3 k-NN

    kNearest neighbor is another algorithm for classification and regression.It calculates the distance between the supplied data and inputs to make its predictions.Thekvalue is the nearest neighbor’s count,and this value will affect the prediction accuracy.k-NN assumes similar features are located closer to each other.In our experiment,the value ofkis fixed to 5 (k=5).k-NN calculates the distance between the new point and the training point.Several methods can be used to calculate the distance,and these include the Euclidean,Manhattan,and Hamming.For example,[44]proposed algorithms for anomaly detection in a series of payloads by calculating the Hamming distance among consecutive payloads.

    k-NN has its limitation,including the challenge of determining the true value ofkand high computational time,especially for large datasets due to the need to compute the distance between each point.The following equations can be used to calculate the distance parameter using the Euclidean,Manhattan,and Hamming distances denoted bydeuc,dman,anddham,respectively.

    4.4.4 Support Vector Machine(SVM)

    SVM represents an algorithm for supervised learning-based classification and uses hyperplanes to define the two data classes’decision boundaries.SVM produces high-performance results,and kernel functions such as RBFKernel and Polykernel could reduce the complexities of various data types.It is also less prone to overfitting compared to other models.The main limitation of SVM is the longer computation time,especially for larger datasets.

    5 Analysis and Discussions

    In this section,we will be discussing the steps involved in the setup of our experiment and the analysis of the results.We will start with the performance evaluation metrics,which will be used to examine the model’s effectiveness.This will be followed by the experiment setup and a reflection of the results.

    5.1 Evaluations Metrics

    The performance of the model was investigated using Weka’s performance metrics.These metrics include accuracy (Acc),detection rate (DR),F-measure (F1),and false alarm rate (FAR) [45].The accuracy score is a reflection of the effectiveness of the algorithms used.The detection rate is the number of actual stages detected over the total number of stages detected in the dataset.The measurement for these metrics is defined in Eqs.(6)-(9) as used in [45].

    He walked down his block and found a lot of stores. He passed a CD store and looked through the front door for a second as he walked. He stopped and went back to look into the store. He saw a beautiful girl about his age and he knew it was love at first sight. He opened the door and walked in, not looking at anything else but her. He walked closer and closer until he was finally at the front desk where she sat.

    Herein TP and TN refer to True Positive and Negative,respectively,while FP and FN denote False Positive and Negative,respectively.Tab.1 shows an example of the results obtained using the Na?ve Bayes classifier.

    Table 1:Results for various feature selection techniques with Na?ve Bayes classifier

    Tab.1 shows the result from the five metrics using Na?ve Bayes.In this example,the highest prediction accuracy of 91.1% was obtained with features from OneR,while the lowest FAR of 1.2% was obtained with features from GainRatio.The highest detection rate was achieved with OneR.The results from the F1-measure showed features from OneR scored the highest results with a prediction of 91.2%.

    5.2 Experimental Setup

    In this experiment,we began by examining the original dataset to understand the various features and observations.We then decided to perform the following steps to reconstruct and relabel the original dataset.

    ? Removed feature “alert id” from the original dataset.This was a redundant feature that was not contributing to our model,leaving us with 7 features.

    ? Perform classification based on the 7 features using Naive Bayes,Bayes Net,k-NN,Random Forest,and SVM classification algorithms.This will be our baseline results.

    ? Extract a further 7 features using MFA from the original 7,giving us a total of 14 features.

    ? Perform classification on the 14 features using the same classifiers.

    ? We then selected the top 10,7,and 5 features in turns and performed the classification.

    Tab.2 shows the experiment scenarios along with the description that explains the composition of stages.

    Table 2:Numerical experiment scenarios

    5.3 Results and Discussions

    The main aim of this research was to improve the detection accuracy of the APT stages.We used a dataset on APT,which was shared by other researchers.The main challenge we faced was the limited number of features on the dataset,and we addressed that by performing feature extraction and selection techniques.Our experiment set the threshold of a satisfactory outcome to be 84.9% for the prediction accuracy based on the original APT dataset provider’s work.Our results achieved a prediction accuracy of 91.1%,which was more than the threshold.In the next subsections,we will discuss the results of our feature extraction and selection processes followed by our classifier results.

    5.3.1 Results from Feature Extraction and Selection

    The original APT dataset contains 8 features and 1 label.We removed the “alert_id”and were left with 7 features.We then used the R package’s FactoMinerR to convert the non-numerical features to categorical features before performing the feature extraction.We eventually ended up with 14 features in total,including 7 extracted features.We then used Information gain,Gain ratio,and OneR feature selection techniques to choose the features that contributed most to our model.We started selecting all the features,including the extracted ones,and then gradually reduced the features until the optimal level was achieved.

    The features were ranked from highest to lowest using the techniques described above.The results showed that 14 of the features had a value greater than zero,which means the MFA feature extraction technique successfully extracted the features relevant to the model.All our extracted features had a value greater than zero.We then performed further feature selection processes until we were left with the final 5 features.Tab.3 shows the top 5 features from the InfoGain,GainRatio,and OneR feature selection methods.Features from OneR produced better results,followed by the features from GainRatio and then InfoGain.The top 5 features from OneR consist of two original features and three extracted features,while the top 5 features from GainRatio consisted of three original features and two extracted features.The top 5 features from InfoGain are all original features,but their prediction accuracy was less than the other two method’s features.We compared the results from the experiment stages and found our feature extraction and selection processes contributed to improvement in the model’s prediction accuracy.

    Table 3:Selected features used across all the selected classifiers

    5.3.2 Classifier Results

    Once we completed relabelling the data and removing the redundant feature,we performed the classification on the remaining 7 features.Tab.4 shows the classifier’s results,including their prediction accuracy.This result will be our baseline.The result shows that the highest accuracy score of 87.43% was obtained with the SVM classifiers.

    Table 4:Classifier experiments and accuracy results

    Our next step was to perform classification on the 14 features,including the 7 extracted features.The result shows that the highest prediction accuracy of 87.87% was obtained with the SVM classifier,as shown in Tab.4.We then performed the classification using the top 10 features consisting of 4 original and 6 extracted features,which shows our extracted features are relevant to the model.The original features are feat1,feat2,feat6,and feat8,while the extracted features are feat9,feat10,feat11,feat12,feat13,and feat14.The result showed improvements in accuracy compared to the 14 features.The highest accuracy of 91.41% was obtained with SVM.

    Having analyzed the top 10 features’classification results,we then decided to select the top 7 features and perform further classifications.The 7 features in the ranking were feat1 and feat6 from the original dataset and feat9,feat11,feat12,feat13,and feat14 from the extracted features.The results show a slight decrease in the accuracy results compared to the top 10 features.The top-performing classification algorithm was Bayes Net,which had a prediction accuracy of 90.85%.

    Finally,we selected the top 5 features according to their ranking score,and the highest prediction accuracy of 91.1% was obtained with Naive Bayes.Tab.4 shows the experiment stages and the corresponding description.There are five stages in total,which start with the relabelled dataset until we reach the final stage,consisting of the relabelled data,extracted features,and top selected features.In this table,CKC stands for the Cyber Kill Chain,and FS stands for feature selection.In FS1,FS2,and FS3,we selected the top 10,7,and 5 features,respectively.Fig.4 shows the experiment stages and the selected features,along with the results obtained from the classifiers.From the figure,it is evident that the prediction accuracy is affected by the number of features.

    Figure 4:Classifier accuracy rates under various numbers of selected features for classification

    In this work,our proposed approach has been studied to detecting APTs relevant for a rather generic IoT framework.Further research may consider applying the Cyber Kill Chain concept to securing specific areas of IoT-enabled applications,such as [46-48].

    6 Conclusion and Future Work

    In this work,we used an APT dataset and reconstructed it to match with the CKC stages.We then performed feature extraction,feature selection,and classification until the final 5 features were selected,as shown in Tab.3.Overall,we obtained a performance score of 91.1%.We used some of the alerts in multiple stages of the CKC compared to the one to one matching between alerts and stages used by dataset providers.We used feature selection to reduce the impact this would have had on our model’s overall prediction accuracy.We believe it was sensible to use some of the alerts in multiple stages,given this will test the performance of the model more rigorously and the fact that alerts will often appear in multiple stages during the APT attack lifecycle.

    The APT dataset we have used is not large,and the original features were only 8,1 label,and 3676 observations.Relevant cyber-security works would benefit from the incorporation of more detection modules and features.We intend to expand on this research in our future work and plan to build a much larger dataset,which contains the detection modules proposed in our work,as shown in Fig.3.

    Funding Statement:The work of Y.Ahmed and A.T.Asyhari was supported in part by the School of Computing and Digital Technology at Birmingham City University.The work of M.A.Rahman was supported in part by the Flagship Grant RDU190374.

    Conflicts of Interest:The author(s) declare that they have no conflict of interest to report regarding the present study.

    亚洲欧美日韩卡通动漫| 亚洲人成伊人成综合网2020| av国产免费在线观看| 日本黄色片子视频| av国产免费在线观看| 免费人成在线观看视频色| 一夜夜www| 日本黄色视频三级网站网址| 国内精品久久久久久久电影| 无遮挡黄片免费观看| 国产成人a区在线观看| 亚洲欧美日韩卡通动漫| 精华霜和精华液先用哪个| 免费一级毛片在线播放高清视频| 91在线精品国自产拍蜜月 | 三级男女做爰猛烈吃奶摸视频| 久久性视频一级片| 日韩欧美精品v在线| 天堂av国产一区二区熟女人妻| 成人18禁在线播放| 校园春色视频在线观看| 在线免费观看不下载黄p国产 | 一级黄色大片毛片| 成人国产综合亚洲| 一个人看视频在线观看www免费 | 波多野结衣高清无吗| 国产极品精品免费视频能看的| 两性午夜刺激爽爽歪歪视频在线观看| 夜夜躁狠狠躁天天躁| 天堂影院成人在线观看| 最新美女视频免费是黄的| 欧美黄色淫秽网站| 成年人黄色毛片网站| 91久久精品国产一区二区成人 | a级毛片a级免费在线| 一区福利在线观看| 久久亚洲精品不卡| www日本黄色视频网| 亚洲精品一区av在线观看| 国内精品美女久久久久久| 国产精品1区2区在线观看.| 欧美最新免费一区二区三区 | 亚洲五月天丁香| 极品教师在线免费播放| or卡值多少钱| 中文字幕人妻丝袜一区二区| 日本免费一区二区三区高清不卡| 国产毛片a区久久久久| 久久久久久久久中文| 成熟少妇高潮喷水视频| 亚洲最大成人手机在线| 免费看美女性在线毛片视频| 久久久久久久久大av| 午夜a级毛片| 不卡一级毛片| 天堂网av新在线| 夜夜夜夜夜久久久久| 久久久色成人| 一个人观看的视频www高清免费观看| 午夜福利18| 欧美不卡视频在线免费观看| www日本在线高清视频| 男女那种视频在线观看| 成年免费大片在线观看| 亚洲人成电影免费在线| 日韩欧美精品免费久久 | 97碰自拍视频| 在线观看免费视频日本深夜| 色老头精品视频在线观看| 国产色婷婷99| 精品一区二区三区av网在线观看| 狂野欧美激情性xxxx| 色视频www国产| 中亚洲国语对白在线视频| 在线观看午夜福利视频| 欧美一区二区亚洲| 90打野战视频偷拍视频| 久久久国产精品麻豆| 他把我摸到了高潮在线观看| 美女免费视频网站| 色哟哟哟哟哟哟| 在线观看免费视频日本深夜| 国产毛片a区久久久久| 婷婷亚洲欧美| 韩国av一区二区三区四区| 99热这里只有是精品50| 亚洲天堂国产精品一区在线| 国产高清三级在线| 午夜精品一区二区三区免费看| 啦啦啦韩国在线观看视频| 免费一级毛片在线播放高清视频| 成人欧美大片| av专区在线播放| 亚洲一区二区三区不卡视频| 岛国在线观看网站| 成人国产综合亚洲| 亚洲 欧美 日韩 在线 免费| 欧美不卡视频在线免费观看| 精品国产超薄肉色丝袜足j| 国产高清视频在线播放一区| 国产精品影院久久| 免费看a级黄色片| 3wmmmm亚洲av在线观看| 国产伦精品一区二区三区视频9 | 性色av乱码一区二区三区2| 久久久久久大精品| 欧美日韩乱码在线| 成人无遮挡网站| 久久久久国内视频| 欧美日韩一级在线毛片| e午夜精品久久久久久久| 欧美另类亚洲清纯唯美| 真实男女啪啪啪动态图| 精品久久久久久久人妻蜜臀av| 欧美高清成人免费视频www| 天天一区二区日本电影三级| 久久国产精品影院| 悠悠久久av| 国产三级中文精品| 91av网一区二区| 一区福利在线观看| АⅤ资源中文在线天堂| 最近视频中文字幕2019在线8| 夜夜爽天天搞| 男插女下体视频免费在线播放| 欧美日韩一级在线毛片| 久久久国产成人精品二区| 亚洲avbb在线观看| 亚洲国产中文字幕在线视频| 亚洲在线自拍视频| 亚洲在线自拍视频| 欧美中文日本在线观看视频| 18美女黄网站色大片免费观看| 宅男免费午夜| 老汉色∧v一级毛片| 亚洲中文日韩欧美视频| 国产97色在线日韩免费| 男插女下体视频免费在线播放| or卡值多少钱| 精品国产美女av久久久久小说| 国产一区二区三区视频了| 天天一区二区日本电影三级| 啦啦啦观看免费观看视频高清| 欧美成人免费av一区二区三区| 成年人黄色毛片网站| 91在线精品国自产拍蜜月 | 亚洲成人久久爱视频| bbb黄色大片| 人妻久久中文字幕网| 免费一级毛片在线播放高清视频| 三级男女做爰猛烈吃奶摸视频| 日本五十路高清| 久久久久久久久大av| 日本a在线网址| svipshipincom国产片| 尤物成人国产欧美一区二区三区| 99热精品在线国产| 内射极品少妇av片p| 国内精品美女久久久久久| 亚洲乱码一区二区免费版| 一区福利在线观看| 亚洲精品粉嫩美女一区| 啪啪无遮挡十八禁网站| 热99re8久久精品国产| 国产av一区在线观看免费| 小蜜桃在线观看免费完整版高清| 亚洲欧美日韩东京热| 国产高潮美女av| 久久精品国产自在天天线| 女生性感内裤真人,穿戴方法视频| 男女视频在线观看网站免费| 狂野欧美白嫩少妇大欣赏| 中文在线观看免费www的网站| 内射极品少妇av片p| 日本免费一区二区三区高清不卡| 在线观看一区二区三区| 麻豆国产97在线/欧美| 亚洲精品影视一区二区三区av| aaaaa片日本免费| 国产成人a区在线观看| 国产免费男女视频| 国内少妇人妻偷人精品xxx网站| 男人舔女人下体高潮全视频| 99在线人妻在线中文字幕| 欧美成人a在线观看| 国产视频内射| 欧美最黄视频在线播放免费| av福利片在线观看| 在线视频色国产色| 亚洲真实伦在线观看| 日韩免费av在线播放| 在线天堂最新版资源| 老司机深夜福利视频在线观看| 国产激情欧美一区二区| xxx96com| 精品久久久久久久久久久久久| 久久精品国产99精品国产亚洲性色| 成年免费大片在线观看| 亚洲欧美激情综合另类| 在线观看免费午夜福利视频| 国产亚洲av嫩草精品影院| 母亲3免费完整高清在线观看| 欧美性猛交黑人性爽| 深夜精品福利| 久久中文看片网| 国产精品av视频在线免费观看| 午夜免费成人在线视频| 午夜福利高清视频| 国产免费一级a男人的天堂| 亚洲中文字幕日韩| www日本在线高清视频| 日韩国内少妇激情av| 搡老熟女国产l中国老女人| 麻豆一二三区av精品| 久久久久国产精品人妻aⅴ院| 神马国产精品三级电影在线观看| 99热只有精品国产| 亚洲av熟女| 在线免费观看不下载黄p国产 | 国产精品自产拍在线观看55亚洲| 一边摸一边抽搐一进一小说| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 亚洲国产精品合色在线| 久久久久久九九精品二区国产| 亚洲精品色激情综合| 在线观看美女被高潮喷水网站 | av欧美777| 国产国拍精品亚洲av在线观看 | 高清在线国产一区| 好看av亚洲va欧美ⅴa在| 悠悠久久av| 久久亚洲精品不卡| 超碰av人人做人人爽久久 | 亚洲在线观看片| 在线观看66精品国产| 亚洲国产精品999在线| 最近视频中文字幕2019在线8| 操出白浆在线播放| 久久久精品大字幕| 成人特级黄色片久久久久久久| 少妇丰满av| a级毛片a级免费在线| 1024手机看黄色片| 九色国产91popny在线| 手机成人av网站| 精品久久久久久,| 国产黄色小视频在线观看| 校园春色视频在线观看| 老司机在亚洲福利影院| 国产免费av片在线观看野外av| 亚洲最大成人手机在线| svipshipincom国产片| 黑人欧美特级aaaaaa片| 18禁黄网站禁片午夜丰满| 老熟妇仑乱视频hdxx| 亚洲欧美一区二区三区黑人| 国模一区二区三区四区视频| 亚洲人成网站在线播放欧美日韩| 国产探花在线观看一区二区| 日韩精品中文字幕看吧| 波多野结衣高清无吗| 在线免费观看的www视频| 亚洲欧美一区二区三区黑人| 成人鲁丝片一二三区免费| 亚洲无线观看免费| 国产爱豆传媒在线观看| 十八禁网站免费在线| 久久九九热精品免费| 真实男女啪啪啪动态图| 国产精品亚洲一级av第二区| 久久99热这里只有精品18| 国产高清有码在线观看视频| 欧美丝袜亚洲另类 | www.色视频.com| 一个人免费在线观看电影| 国产成人欧美在线观看| 91在线观看av| 久久欧美精品欧美久久欧美| АⅤ资源中文在线天堂| 久久久色成人| 两个人看的免费小视频| 成人特级黄色片久久久久久久| 一区福利在线观看| 69人妻影院| 精品99又大又爽又粗少妇毛片 | 嫩草影院精品99| 毛片女人毛片| 狂野欧美激情性xxxx| 久久精品国产亚洲av涩爱 | 国内久久婷婷六月综合欲色啪| 国语自产精品视频在线第100页| 黄色女人牲交| 99riav亚洲国产免费| 男女那种视频在线观看| 日韩中文字幕欧美一区二区| 国产伦精品一区二区三区视频9 | 亚洲欧美精品综合久久99| 国产精品亚洲美女久久久| 精品久久久久久,| 亚洲狠狠婷婷综合久久图片| 男人和女人高潮做爰伦理| 精品日产1卡2卡| 国产免费男女视频| 男女午夜视频在线观看| 免费看美女性在线毛片视频| 少妇人妻精品综合一区二区 | 久久精品国产亚洲av香蕉五月| 日本a在线网址| 欧美成人免费av一区二区三区| 国产精品亚洲美女久久久| 3wmmmm亚洲av在线观看| а√天堂www在线а√下载| 国产97色在线日韩免费| 熟妇人妻久久中文字幕3abv| 日韩 欧美 亚洲 中文字幕| 嫩草影院入口| 精品久久久久久久久久久久久| 亚洲一区二区三区色噜噜| 久久精品影院6| 亚洲人成伊人成综合网2020| 欧美乱码精品一区二区三区| 国产三级在线视频| 免费看美女性在线毛片视频| 三级毛片av免费| 久久精品亚洲精品国产色婷小说| 2021天堂中文幕一二区在线观| 日本免费a在线| 欧洲精品卡2卡3卡4卡5卡区| 免费av不卡在线播放| 日韩欧美三级三区| 国产精品美女特级片免费视频播放器| 亚洲国产日韩欧美精品在线观看 | 中国美女看黄片| 在线播放国产精品三级| 在线天堂最新版资源| 精品久久久久久久毛片微露脸| 亚洲人与动物交配视频| 欧美+日韩+精品| 日韩 欧美 亚洲 中文字幕| 一边摸一边抽搐一进一小说| 精品一区二区三区av网在线观看| 国内精品美女久久久久久| 亚洲狠狠婷婷综合久久图片| 国产精品久久久久久久久免 | 人妻久久中文字幕网| 黄色日韩在线| 热99在线观看视频| 亚洲国产欧美人成| 亚洲精华国产精华精| bbb黄色大片| 一本精品99久久精品77| 亚洲国产欧美网| 国产精品久久久久久久电影 | 一个人免费在线观看的高清视频| 岛国在线免费视频观看| 一进一出抽搐动态| 天堂影院成人在线观看| 成人高潮视频无遮挡免费网站| 精品一区二区三区视频在线观看免费| 日韩欧美精品v在线| 亚洲熟妇熟女久久| 久久6这里有精品| 亚洲人成伊人成综合网2020| 老熟妇乱子伦视频在线观看| 天堂动漫精品| 国产亚洲欧美98| 国语自产精品视频在线第100页| 一二三四社区在线视频社区8| 亚洲成a人片在线一区二区| 国产毛片a区久久久久| 18禁国产床啪视频网站| 精品无人区乱码1区二区| 亚洲天堂国产精品一区在线| 精品一区二区三区人妻视频| 亚洲av电影在线进入| 亚洲人成网站在线播| 亚洲成人免费电影在线观看| 亚洲av电影在线进入| 色综合欧美亚洲国产小说| 又紧又爽又黄一区二区| 99在线人妻在线中文字幕| 国产精品久久久久久久久免 | 亚洲在线自拍视频| 亚洲国产精品sss在线观看| 欧美成人一区二区免费高清观看| 人妻丰满熟妇av一区二区三区| 少妇人妻一区二区三区视频| 欧美zozozo另类| 国产探花在线观看一区二区| 18禁黄网站禁片免费观看直播| 99riav亚洲国产免费| 好看av亚洲va欧美ⅴa在| 一区福利在线观看| 国产成人aa在线观看| 成年版毛片免费区| 亚洲av美国av| 国产单亲对白刺激| 国产免费一级a男人的天堂| 天堂√8在线中文| 蜜桃亚洲精品一区二区三区| 日本黄大片高清| 男女之事视频高清在线观看| 亚洲人成网站高清观看| 村上凉子中文字幕在线| 久久久久九九精品影院| 窝窝影院91人妻| 国产主播在线观看一区二区| 亚洲人成电影免费在线| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲av免费在线观看| www国产在线视频色| 国产精品综合久久久久久久免费| 欧美成人a在线观看| 亚洲成av人片在线播放无| 国产精品久久久人人做人人爽| 亚洲人成电影免费在线| 日韩精品中文字幕看吧| 国产精品一区二区三区四区久久| 成人鲁丝片一二三区免费| 亚洲专区国产一区二区| 女生性感内裤真人,穿戴方法视频| 国内久久婷婷六月综合欲色啪| 国产爱豆传媒在线观看| АⅤ资源中文在线天堂| 精品一区二区三区视频在线 | 日韩欧美 国产精品| 亚洲,欧美精品.| 久久午夜亚洲精品久久| xxx96com| 国产99白浆流出| 深夜精品福利| 免费观看的影片在线观看| 高清在线国产一区| h日本视频在线播放| 久久这里只有精品中国| 在线观看美女被高潮喷水网站 | 国内精品美女久久久久久| 久久久久久久久大av| 国产精品 国内视频| 婷婷丁香在线五月| 久久精品亚洲精品国产色婷小说| 成人国产一区最新在线观看| 九色成人免费人妻av| 黄片大片在线免费观看| 法律面前人人平等表现在哪些方面| 亚洲男人的天堂狠狠| 最近最新中文字幕大全电影3| 国产野战对白在线观看| 免费观看的影片在线观看| 成人国产综合亚洲| 久久久久久国产a免费观看| 两个人看的免费小视频| 国产主播在线观看一区二区| 青草久久国产| 成人国产综合亚洲| 九色成人免费人妻av| 在线播放国产精品三级| 欧美av亚洲av综合av国产av| 国产亚洲av嫩草精品影院| 老司机在亚洲福利影院| 深爱激情五月婷婷| 日韩欧美国产在线观看| 欧美av亚洲av综合av国产av| 久久久国产成人免费| 麻豆成人av在线观看| 叶爱在线成人免费视频播放| 怎么达到女性高潮| 九九久久精品国产亚洲av麻豆| 在线免费观看不下载黄p国产 | 男人和女人高潮做爰伦理| 老司机深夜福利视频在线观看| 亚洲国产欧美人成| 久久国产精品人妻蜜桃| 国产不卡一卡二| 在线看三级毛片| 91久久精品电影网| 一本久久中文字幕| 色老头精品视频在线观看| 中文字幕熟女人妻在线| 怎么达到女性高潮| 国产精品久久久久久精品电影| 国产v大片淫在线免费观看| 大型黄色视频在线免费观看| 男人的好看免费观看在线视频| 国产精品国产高清国产av| 亚洲av一区综合| 久久精品国产综合久久久| 少妇的逼好多水| 精品久久久久久久久久久久久| 啦啦啦免费观看视频1| 欧美丝袜亚洲另类 | 一本一本综合久久| h日本视频在线播放| а√天堂www在线а√下载| 在线播放无遮挡| 国产欧美日韩精品亚洲av| 国产精品永久免费网站| www日本黄色视频网| 又爽又黄无遮挡网站| 午夜影院日韩av| 老司机午夜十八禁免费视频| 国产高潮美女av| 青草久久国产| 国产老妇女一区| 嫩草影院入口| 精品一区二区三区视频在线 | 观看美女的网站| 搡老熟女国产l中国老女人| 亚洲无线在线观看| 窝窝影院91人妻| 国产成年人精品一区二区| 成人18禁在线播放| www日本黄色视频网| 久久久国产成人精品二区| 精品人妻1区二区| 亚洲欧美日韩高清专用| 日韩中文字幕欧美一区二区| 成人无遮挡网站| 99国产精品一区二区三区| 极品教师在线免费播放| av专区在线播放| 97超视频在线观看视频| 亚洲不卡免费看| 欧美在线黄色| 欧美3d第一页| av天堂在线播放| 色精品久久人妻99蜜桃| 美女被艹到高潮喷水动态| 精华霜和精华液先用哪个| 男插女下体视频免费在线播放| 尤物成人国产欧美一区二区三区| 欧美一区二区精品小视频在线| 欧美日韩乱码在线| 亚洲在线观看片| 亚洲精品成人久久久久久| 日韩欧美精品免费久久 | 国产欧美日韩一区二区精品| 国产伦在线观看视频一区| 精品乱码久久久久久99久播| 日本撒尿小便嘘嘘汇集6| 免费av不卡在线播放| 90打野战视频偷拍视频| 内地一区二区视频在线| 国内精品美女久久久久久| 最近最新中文字幕大全免费视频| 久久久精品大字幕| 亚洲美女黄片视频| 国产精品久久视频播放| 小蜜桃在线观看免费完整版高清| 午夜福利欧美成人| 国产成人影院久久av| 国产老妇女一区| 桃红色精品国产亚洲av| 久久精品91蜜桃| 男人的好看免费观看在线视频| 夜夜看夜夜爽夜夜摸| 亚洲五月婷婷丁香| 国产一级毛片七仙女欲春2| 亚洲最大成人手机在线| 亚洲中文字幕日韩| 给我免费播放毛片高清在线观看| 亚洲电影在线观看av| 亚洲欧美日韩高清专用| 久久久久久人人人人人| 国产欧美日韩一区二区精品| 人妻夜夜爽99麻豆av| 日韩有码中文字幕| 在线观看av片永久免费下载| 精品熟女少妇八av免费久了| 男人舔奶头视频| 97超级碰碰碰精品色视频在线观看| 99国产极品粉嫩在线观看| 亚洲一区高清亚洲精品| 午夜福利18| 欧美日韩亚洲国产一区二区在线观看| 一a级毛片在线观看| 色综合欧美亚洲国产小说| 久久亚洲精品不卡| 国产精品永久免费网站| 香蕉av资源在线| 观看免费一级毛片| 国产黄a三级三级三级人| 日日摸夜夜添夜夜添小说| 国产一区二区在线av高清观看| 国产伦精品一区二区三区四那| 色综合站精品国产| 在线观看舔阴道视频| 亚洲av一区综合| 白带黄色成豆腐渣| 嫩草影院入口| 亚洲国产高清在线一区二区三| 久久久色成人| 成人国产一区最新在线观看| 亚洲欧美激情综合另类| 欧美av亚洲av综合av国产av| www国产在线视频色| 久久精品国产亚洲av香蕉五月| 国产精品一区二区免费欧美| 国产精品三级大全| 国产成+人综合+亚洲专区| 啪啪无遮挡十八禁网站| 亚洲人成网站在线播放欧美日韩| 男插女下体视频免费在线播放| 成人特级黄色片久久久久久久| 操出白浆在线播放| 波多野结衣高清无吗| 亚洲第一欧美日韩一区二区三区| 99久久精品热视频| 亚洲在线自拍视频| 久久久久久大精品| 一个人看视频在线观看www免费 | 国产午夜精品论理片| 天天躁日日操中文字幕| 亚洲国产高清在线一区二区三| 精品熟女少妇八av免费久了|