ISSN :3049-2335

Uncovering Malicious Persistence: Machine Learning-Based Detection of Windows Scheduled Tasks

Original Research (Published On: 27-Nov-2025 )

Khaled Rahal, Arbia Riahi, Georgi Nikolov, Thibault Debatty and Jean-Michel Dricot

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (3):310-336

Khaled Rahal : Cyber Defence Lab of the Royal Military Academy (Belgium)

Arbia Riahi : Cyber Defence Lab, Royal Military Academy

Georgi Nikolov : Cyber Defence Lab, Royal Military Academy

Thibault Debatty : Cyber Defence Lab, Royal Military Academy

Jean-Michel Dricot : Cybersecurity Research Center

Download PDF Here

Article History: Received on: 18-Jul-25, Accepted on: 11-Nov-25, Published on: 27-Nov-25

Corresponding Author: Khaled Rahal

Email: k.rahal@cylab.be

Citation: Khaled Rahal (2025). Uncovering Malicious Persistence: Machine Learning-Based Detection of Windows Scheduled Tasks. Adv. Know. Base. Syst. Data Sci. Cyber., 2 (3 ):310-336


s

Abstract

    

Advanced Persistent Threats (APT) represent a serious security concern because they carry out long-term and carefully planned attacks. While a lot of research has gone into finding ways to detect these threats; one crucial area often gets less attention, namely the persistence mechanisms that allow attackers to stay hidden and maintain access to systems over time. In this work, we investigate scheduled tasks, a widely used persistence technique in Windows environments, and analyze their role in APT operations. We conducted an in-depth study of how attackers leverage scheduled tasks to maintain stealthy access and execute malicious actions over time. We introduce Detecting APT Through Malicious Scheduled Tasks (DAPTASK), an approach that leverages Sysmon log data, Word2Vec-based feature representation, and Machine Learning (ML) classifiers to identify malicious scheduled tasks commonly used in APT persistence techniques. Our approach achieves a high detection performance, with an F1-score of 95.19\%. Furthermore, we provide a labeled dataset, which can serve as a valuable resource for researchers developing APT detection methods, the dataset and the code used are publicly available at https://gitlab.cylab.be/cylab/daptask. Our approach enhances APT detection by addressing persistence techniques, a critical yet often neglected attack vector.

Statistics

   Article View: 129
   PDF Downloaded: 10