A Fuzzy-based Process Mining Approach for Dynamic Malware Detection

被引:0
|
作者
Bernardi, Mario Luca [1 ]
Cimitile, Marta [2 ]
Martinelli, Fabio [3 ]
Mercaldo, Francesco [3 ]
机构
[1] Giustino Fortunato Univ, Benevento, Italy
[2] Unitelma Sapienza Univ, Rome, Italy
[3] CNR, Natl Res Council Italy, Inst Informat & Telemat, Pisa, Italy
关键词
RULE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile systems have become essential for communication and productivity but are also becoming target of continuous malware attacks. New malware are often obtained as variants of existing malicious code. This work describes an approach for dynamic malware detection based on the combination of Process Mining (PM) and Fuzzy Logic (FL) techniques. The firsts are used to characterize the behavior of an application identifying some recurring execution expressed as a set of declarative constraints between the system calls. Fuzzy logic is used to classify the analyzed malware applications and verify their relations with the existing malware variants. The combination of the two techniques allows to obtain a fingerprint of an application that is used to verify its maliciousness/trustfulness, establish if it belongs from a known malware family and identify the differences between the detected malware behavior and the other variants of the some malware family. The approach is applied on a dataset of 3000 trusted and malicious applications across twelve malware families and has shown a very good discrimination ability that can be exploited for malware detection and family identification.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] A Data Mining Classification Approach for Behavioral Malware Detection
    Norouzi, Monire
    Souri, Alireza
    Zamini, Majid Samad
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016 (2016)
  • [22] Mining and Detection of Anaroia Malware Based on Permissions
    Sahal, Abdirashid Ahmed
    Alam, Shahid
    Sogukpinar, Ibrahim
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 264 - 268
  • [23] Fuzzy-based dynamic bandwidth allocation system
    Leu, FY
    Yan, SJ
    Chang, WK
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 911 - 920
  • [24] A fuzzy-based approach for cluster management in VANETs: Performance evaluation for two fuzzy-based systems
    Ozera, Kosuke
    Bylykbashi, Kevin
    Liu, Yi
    Barolli, Leonard
    INTERNET OF THINGS, 2018, 3-4 : 120 - 133
  • [25] Fuzzy-based MTD A fuzzy decisive approach for moving target detection in multichannel SAR framework
    Jaya, Eppili
    Krishna, B. T.
    DATA TECHNOLOGIES AND APPLICATIONS, 2020, 54 (01) : 66 - 84
  • [26] Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis
    Sihwail, Rami
    Omar, Khairuddin
    Ariffin, Khairul Akram Zainol
    Al Afghani, Sanad
    APPLIED SCIENCES-BASEL, 2019, 9 (18):
  • [27] Fuzzy-based HAZOP study for process industry
    Ahn, Junkeon
    Chang, Daejun
    JOURNAL OF HAZARDOUS MATERIALS, 2016, 317 : 303 - 311
  • [28] New approach for APT malware detection on the workstation based on process profile
    Cho Do Xuan
    Huong, D. T.
    Duc Duong
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (04) : 4815 - 4834
  • [29] Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection
    Shalaginov, Andrii
    2017 20TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2017, : 1369 - 1376
  • [30] An adaptive fuzzy-based edge detection algorithm
    Yong Yang
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 208 - 211