Khaled Rahal, Arbia Riahi, Georgi Nikolov, Thibault Debatty and Jean-Michel Dricot
Adv. Know. Base. Syst. Data Sci. Cyber., 2 (3):310-336
Khaled Rahal : Cyber Defence Lab of the Royal Military Academy (Belgium)
Arbia Riahi : Cyber Defence Lab, Royal Military Academy
Georgi Nikolov : Cyber Defence Lab, Royal Military Academy
Thibault Debatty : Cyber Defence Lab, Royal Military Academy
Jean-Michel Dricot : Cybersecurity Research Center
Article History: Received on: 18-Jul-25, Accepted on: 11-Nov-25, Published on: 27-Nov-25
Corresponding Author: Khaled Rahal
Email: k.rahal@cylab.be
Citation: Khaled Rahal (2025). Uncovering Malicious Persistence: Machine Learning-Based Detection of Windows Scheduled Tasks. Adv. Know. Base. Syst. Data Sci. Cyber., 2 (3 ):310-336
Advanced Persistent Threats (APT) represent a serious security concern because they carry out long-term and carefully planned attacks. While a lot of research has gone into finding ways to detect these threats; one crucial area often gets less attention, namely the persistence mechanisms that allow attackers to stay hidden and maintain access to systems over time. In this work, we investigate scheduled tasks, a widely used persistence technique in Windows environments, and analyze their role in APT operations. We conducted an in-depth study of how attackers leverage scheduled tasks to maintain stealthy access and execute malicious actions over time. We introduce Detecting APT Through Malicious Scheduled Tasks (DAPTASK), an approach that leverages Sysmon log data, Word2Vec-based feature representation, and Machine Learning (ML) classifiers to identify malicious scheduled tasks commonly used in APT persistence techniques. Our approach achieves a high detection performance, with an F1-score of 95.19\%. Furthermore, we provide a labeled dataset, which can serve as a valuable resource for researchers developing APT detection methods, the dataset and the code used are publicly available at https://gitlab.cylab.be/cylab/daptask. Our approach enhances APT detection by addressing persistence techniques, a critical yet often neglected attack vector.