NETWORK MALWARE ANALYSIS
Ключевые слова:
Type-2 Fuzzy Sets, Interval Type-2 Fuzzy Logic System, Web Ontology Language, Malware Behavioral Analysis, MiTАннотация
Malware is one of the problems really existing in the modern post-industrial society. Hackers continuously develop novel techniques to intrude into computer systems for various reasons, so many security researchers should analyze and track new malicious program to protect sensitive information for the computer system. In this paper, we integrate the Interval Type-2 Fuzzy Logic System (IT2FLS) with malware behavioral analysis: Malware Analysis Network in Uzbekistan (MAN in Uzbekistan, MiT). The core techniques of MiT are as follows: (1) automatically collect the logs the difference operation system to extract unknown behavior information.
Библиографические ссылки
H. D. Huang, G. Acampora, V. Loia, C. S. Lee, and H. Y. Kao, "Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis,"
S. Y. Dai, Y. Fyodor, S. Y. Kuo, M. W. Wu, and Y. Huang, "Malware Profiler Based on Innovative Behavior-Awareness Technique," .
S. Y. Dai, Y. Fyodor, M. W. Wu, Y. Huang, and S. Y. Kuo, "Holography: a behavior-based profiler for malware analysis,".
G. Wagener, R. State, and A. Dulaunoy, "Malware behaviour analysis," Journal in Computer Virology, vol. 4, no. 4, pp. 279-287, 2008.
M. K. Sun, M. J. Lin, M. Chang, C. S. Laih, and H. T. Lin, "Malware Virtualization-Resistant Behavior Detection," .
C. S. Lee, Z. W. Jian, and L. K. Huang, "A fuzzy ontology and its application to news summarization,".
G. Acampora and V. Loia, "Fuzzy control interoperability and scalability for adaptive domotic framework,".
H. Hagras and C. Wagner, "Towards the Widespread Use of Type-2 Fuzzy Logic Systems in Real World Applications".
D. Wu, "On the Fundamental Differences Between Type-1 and Interval Type-2 Fuzzy Logic Controllers,".
C. S. Lee, M. H. Wang, and H. Hagras, "A Type-2 Fuzzy Ontology and Its Application to Personal Diabetic-Diet Recommendation," .
U. Bayer, I. Habibi, D. Balzarotti, E. Kirda, and C. Kruegel, "Insights Into Current Malware Behavior," 2nd USENIX Workshop on LargeScale Exploits and Emergent Threats (LEET), Boston, MA, 2018.
Опубликован
Выпуск
Раздел
Лицензия

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.