Artificial Intelligence Based Malware Analysis

نویسندگان

  • Avi Pfeffer
  • Brian E. Ruttenberg
  • Lee Kellogg
  • Michael Howard
  • Catherine Call
  • Alison O'Connor
  • Glenn Takata
  • Scott Neal Reilly
  • Terry Patten
  • Jason Taylor
  • Robert Hall
  • Arun Lakhotia
  • Craig Miles
  • Daniel Scofield
  • Jared Frank
چکیده

Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber– defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber–attacks, and malware–based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future characteristics of malware. In this paper, we present the Malware Analysis and Attributed using Genetic Information (MAAGI) system. The underlying idea behind the MAAGI system is that there are strong similarities between malware behavior and biological organism behavior, and applying biologically inspired methods to corpora of malware can help analysts better understand the ecosystem of malware attacks. Due to the sophistication of the malware and the analysis, the MAAGI system relies heavily on artificial intelligence techniques to provide this capability. It has already yielded promising results over its development life, and will hopefully inspire more integration between the artificial intelligence and cyber–defense communities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Approach to Detect Malware that Exploit Information Hiding using Artificial Intelligence in Android Devices

Malware is a found to be a big threat in computing world. It continues to grow and evolve in complexity. Modern malware hide from static and dynamic analysis tools using advanced techniques. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detection for the ...

متن کامل

DroidDetector: Android Malware Characterization and Detection Using Deep Learning

Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained inc...

متن کامل

Sistema inmune artificial para estegoanálisis de imágenes JPEG

Steganography is one of the most used hiding information techniques today.Recently, the use of steganography techniques has been reported very successful to hide malicious code inside, apparently innocuous, multimedia objects, in order to infiltrate malware into organizations and personal devices, avoiding malware detection controls. Once the embedded malware has reached its destination, anothe...

متن کامل

An Overview of the Artificial Intelligence Applications in Identifying and Combating the Covid-19 Pandemic

Intruduction: In late 2019, people around the world became infected with Covid-19 by the outbreak, the pandemy and epidemy of this disease. To this end, researchers in various fields are seeking to find solutions to the problems related to the control and management of crises. The transmission power of the new corona virus has drawn the attention of experts in the use of artificial intelligence...

متن کامل

An Entropy-Based Network Anomaly Detection Method

Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of large quantities of data to identify items, events or observations which do not conform to an expected pattern. Anomaly detection is applicable in a variety o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1704.08716  شماره 

صفحات  -

تاریخ انتشار 2017