NETWORK MALWARE ANALYSIS

Авторы

  • Yusuf Buriyev Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi, Assiatant Teacher of the Department “Systematic and Practical Programming” Автор

Ключевые слова:

Type-2 Fuzzy Sets, Interval Type-2 Fuzzy Logic System, Web Ontology Language, Malware Behavioral Analysis, MiT

Аннотация

Malware is one of the problems really existing in the modern post-industrial society. Hackers continuously develop novel techniques to intrude into computer systems for various reasons, so many security researchers should analyze and track new malicious program to protect sensitive information for the computer system. In this paper, we integrate the Interval Type-2 Fuzzy Logic System (IT2FLS) with malware behavioral analysis: Malware Analysis Network in Uzbekistan (MAN in Uzbekistan, MiT). The core techniques of MiT are as follows: (1) automatically collect the logs the difference operation system to extract unknown behavior information.

Библиографические ссылки

H. D. Huang, G. Acampora, V. Loia, C. S. Lee, and H. Y. Kao, "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis,"

S. Y. Dai, Y. Fyodor, S. Y. Kuo, M. W. Wu, and Y. Huang, "Malware Profiler Based on Innovative Behavior-Awareness Technique," .

S. Y. Dai, Y. Fyodor, M. W. Wu, Y. Huang, and S. Y. Kuo, "Holography: a behavior-based profiler for malware analysis,".

G. Wagener, R. State, and A. Dulaunoy, "Malware behaviour analysis," Journal in Computer Virology, vol. 4, no. 4, pp. 279-287, 2008.

M. K. Sun, M. J. Lin, M. Chang, C. S. Laih, and H. T. Lin, "Malware Virtualization-Resistant Behavior Detection," .

C. S. Lee, Z. W. Jian, and L. K. Huang, "A fuzzy ontology and its application to news summarization,".

G. Acampora and V. Loia, "Fuzzy control interoperability and scalability for adaptive domotic framework,".

H. Hagras and C. Wagner, "Towards the Widespread Use of Type-2 Fuzzy Logic Systems in Real World Applications".

D. Wu, "On the Fundamental Differences Between Type-1 and Interval Type-2 Fuzzy Logic Controllers,".

C. S. Lee, M. H. Wang, and H. Hagras, "A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation," .

U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel, "Insights Into Current Malware Behavior," 2nd USENIX Workshop on LargeScale Exploits and Emergent Threats (LEET), Boston, MA, 2018.

Опубликован

2022-12-23

Как цитировать

NETWORK MALWARE ANALYSIS. (2022). Евразийский журнал академических исследований, 2(13), 1045-1052. https://in-academy.uz/index.php/EJAR/article/view/1666