A Fuzzy-based Process Mining Approach for Dynamic Malware Detection

被引:0
|
作者
Bernardi, Mario Luca [1 ]
Cimitile, Marta [2 ]
Martinelli, Fabio [3 ]
Mercaldo, Francesco [3 ]
机构
[1] Giustino Fortunato Univ, Benevento, Italy
[2] Unitelma Sapienza Univ, Rome, Italy
[3] CNR, Natl Res Council Italy, Inst Informat & Telemat, Pisa, Italy
关键词
RULE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile systems have become essential for communication and productivity but are also becoming target of continuous malware attacks. New malware are often obtained as variants of existing malicious code. This work describes an approach for dynamic malware detection based on the combination of Process Mining (PM) and Fuzzy Logic (FL) techniques. The firsts are used to characterize the behavior of an application identifying some recurring execution expressed as a set of declarative constraints between the system calls. Fuzzy logic is used to classify the analyzed malware applications and verify their relations with the existing malware variants. The combination of the two techniques allows to obtain a fingerprint of an application that is used to verify its maliciousness/trustfulness, establish if it belongs from a known malware family and identify the differences between the detected malware behavior and the other variants of the some malware family. The approach is applied on a dataset of 3000 trusted and malicious applications across twelve malware families and has shown a very good discrimination ability that can be exploited for malware detection and family identification.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A fuzzy-based instance selection approach for data mining
    Wright, P
    Hodges, J
    NINTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2000), VOLS 1 AND 2, 2000, : 381 - 386
  • [2] Dynamic malware detection and phylogeny analysis using process mining
    Bernardi, Mario Luca
    Cimitile, Marta
    Distante, Damiano
    Martinelli, Fabio
    Mercaldo, Francesco
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 257 - 284
  • [3] Dynamic malware detection and phylogeny analysis using process mining
    Mario Luca Bernardi
    Marta Cimitile
    Damiano Distante
    Fabio Martinelli
    Francesco Mercaldo
    International Journal of Information Security, 2019, 18 : 257 - 284
  • [4] A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems
    Li, Bo
    Li, Jianxin
    Wo, Tianyu
    Wu, Xudong
    Arshad, Junaid
    Liu, Wantao
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 115 - +
  • [5] A FUZZY-BASED APPROACH FOR TRAFFIC JAM DETECTION
    Abd El-Tawaba, Ayman Hussein
    Fattah, Tarek Abd El
    Mahmood, Mahmood A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 257 - 263
  • [6] A Dynamic Malware Detection Approach by Mining the Frequency of API Calls
    Bai, Jinrong
    An, Zhenzhou
    Zou, Guozhong
    Mu, Shiguang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 309 - 312
  • [7] A Fuzzy-Based Approach for Transformer Dynamic Loading Capability Assessment
    Savaghebi, M.
    Gholami, A.
    Vahedi, A.
    Hooshyar, H.
    2008 PROCEEDINGS OF THE 43RD INTERNATIONAL UNIVERSITIES POWER ENGINEERING CONFERENCE, VOLS 1-3, 2008, : 235 - 239
  • [8] A Fuzzy-based Autoscaling Approach for Process Centered Cloud Systems
    Acampora, Giovanni
    Bernardi, Mario Luca
    Cimitile, Marta
    Tortora, Genoveffa
    Vitiello, Autilia
    2017 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2017,
  • [9] A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs
    Tayssir Ismail
    Nasreddine Hajlaoui
    Haifa Touati
    Mohamed Elhadad
    Paul Muhlethaler
    Leila Azouz Saidane
    SN Computer Science, 5 (7)
  • [10] Fuzzy-based automatic approach for underwater docks' anomalies detection
    Montseny, E.
    Sobrevilla, P.
    Romani, S.
    Monteferre, A.
    NAFIPS 2006 - 2006 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY, VOLS 1 AND 2, 2006, : 547 - +