Artificial Intelligence Based Malware Analysis
نویسندگان
چکیده
Artificial intelligence methods have often been applied to perform specific functions or tasks in the cyber– defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber–attacks, and malware–based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future characteristics of malware. In this paper, we present the Malware Analysis and Attributed using Genetic Information (MAAGI) system. The underlying idea behind the MAAGI system is that there are strong similarities between malware behavior and biological organism behavior, and applying biologically inspired methods to corpora of malware can help analysts better understand the ecosystem of malware attacks. Due to the sophistication of the malware and the analysis, the MAAGI system relies heavily on artificial intelligence techniques to provide this capability. It has already yielded promising results over its development life, and will hopefully inspire more integration between the artificial intelligence and cyber–defense communities.
منابع مشابه
An Effective Approach to Detect Malware that Exploit Information Hiding using Artificial Intelligence in Android Devices
Malware is a found to be a big threat in computing world. It continues to grow and evolve in complexity. Modern malware hide from static and dynamic analysis tools using advanced techniques. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detection for the ...
متن کاملDroidDetector: Android Malware Characterization and Detection Using Deep Learning
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained inc...
متن کاملSistema inmune artificial para estegoanálisis de imágenes JPEG
Steganography is one of the most used hiding information techniques today.Recently, the use of steganography techniques has been reported very successful to hide malicious code inside, apparently innocuous, multimedia objects, in order to infiltrate malware into organizations and personal devices, avoiding malware detection controls. Once the embedded malware has reached its destination, anothe...
متن کاملAn Overview of the Artificial Intelligence Applications in Identifying and Combating the Covid-19 Pandemic
Intruduction: In late 2019, people around the world became infected with Covid-19 by the outbreak, the pandemy and epidemy of this disease. To this end, researchers in various fields are seeking to find solutions to the problems related to the control and management of crises. The transmission power of the new corona virus has drawn the attention of experts in the use of artificial intelligence...
متن کاملAn Entropy-Based Network Anomaly Detection Method
Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of large quantities of data to identify items, events or observations which do not conform to an expected pattern. Anomaly detection is applicable in a variety o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1704.08716 شماره
صفحات -
تاریخ انتشار 2017