Intelligent Systems Design for Malware Classification Under Adversarial Conditions

07/06/2019
by   Sean M. Devine, et al.
0

The use of machine learning and intelligent systems has become an established practice in the realm of malware detection and cyber threat prevention. In an environment characterized by widespread accessibility and big data, the feasibility of malware classification without the use of artificial intelligence-based techniques has been diminished exponentially. Also characteristic of the contemporary realm of automated, intelligent malware detection is the threat of adversarial machine learning. Adversaries are looking to target the underlying data and/or algorithm responsible for the functionality of malware classification to map its behavior or corrupt its functionality. The ends of such adversaries are bypassing the cyber security measures and increasing malware effectiveness. The focus of this research is the design of an intelligent systems approach using machine learning that can accurately and robustly classify malware under adversarial conditions. Such an outcome ultimately relies on increased flexibility and adaptability to build a model robust enough to identify attacks on the underlying algorithm.

READ FULL TEXT
research
09/21/2020

AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce

The use of Artificial Intelligence (AI) and Machine Learning (ML) to sol...
research
09/10/2022

GITCBot: A Novel Approach for the Next Generation of C&C Malware

Online Social Networks (OSNs) attracted millions of users in the world. ...
research
08/27/2021

Mal2GCN: A Robust Malware Detection Approach Using Deep Graph Convolutional Networks With Non-Negative Weights

With the growing pace of using machine learning to solve various problem...
research
09/21/2019

Dynamic data fusion using multi-input models for malware classification

Criminals use malware to disrupt cyber-systems. The number of these malw...
research
07/19/2019

New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning

With the development of artificial intelligence algorithms like deep lea...
research
03/07/2022

The Dangerous Combo: Fileless Malware and Cryptojacking

Fileless malware and cryptojacking attacks have appeared independently a...
research
01/15/2021

Identifying Authorship Style in Malicious Binaries: Techniques, Challenges Datasets

Attributing a piece of malware to its creator typically requires threat ...

Please sign up or login with your details

Forgot password? Click here to reset