首页> 外文期刊>Soft computing: A fusion of foundations, methodologies and applications >IT2FS-based ontology with soft-computing mechanism for malware behavior analysis
【24h】

IT2FS-based ontology with soft-computing mechanism for malware behavior analysis

机译:基于IT2FS的本体和带有软计算机制的恶意软件行为分析

获取原文
获取原文并翻译 | 示例
           

摘要

Antimalware application is one of the most important research issues in the area of cyber security threat. Nowadays, because hackers continuously develop novel techniques to intrude into computer systems for various reasons, many security researchers should analyze and track new malicious program to protect sensitive and valuable information in the organization. In this paper, we propose a novel soft-computing mechanism based on the ontology model for malware behavioral analysis: Malware Analysis Network in Taiwan (MAN in Taiwan, MiT). The core techniques of MiT contain two parts listed as follows: (1) collect the logs of network connection, registry, and memory from the operation system on the physical-virtual hybrid analysis environment to get and extract more unknown malicious behavior information. The important information is then extracted to construct the ontology model by using the Web Ontology Language and Fuzzy Markup Language. Additionally, MiT is also able to automatically provide and share samples and reports via the cloud storage mechanism; (2) apply the techniques of Interval Type-2 Fuzzy Set to construct the malware analysis domain knowledge, namely the Interval Type-2 Fuzzy Malware Ontology (IT2FMO), for malware behavior analysis. Simulation results show that the proposed approach can effectively execute the malware behavior analysis, and the constructed system has also released under GNU General Public License version 3. In the future, the system is expected to largely collect and analyze malware samples for providing industries or universities to do related applications via the established IT2FMO.
机译:反恶意软件的应用是网络安全威胁领域最重要的研究问题之一。如今,由于黑客出于各种原因不断开发出入侵计算机系统的新颖技术,因此许多安全研究人员应分析和跟踪新的恶意程序,以保护组织中的敏感和有价值的信息。在本文中,我们提出了一种基于本体模型的新型软计算机制,用于恶意软件行为分析:台湾的恶意软件分析网络(台湾的MAN,MiT)。 MiT的核心技术包括以下两个部分:(1)在物理-虚拟混合分析环境上从操作系统收集网络连接,注册表和内存的日志,以获取和提取更多未知的恶意行为信息。然后使用Web本体语言和模糊标记语言提取重要信息以构建本体模型。此外,MiT还能够通过云存储机制自动提供并共享样本和报告; (2)应用间隔2型模糊集技术构建恶意软件分析领域知识,即间隔2型模糊恶意软件本体(IT2FMO),以进行恶意软件行为分析。仿真结果表明,该方法可以有效地进行恶意软件行为分析,所构建的系统也已在GNU通用公共许可证版本3下发布。未来,该系统有望在很大程度上收集和分析恶意软件样本,为行业或大学提供服务。通过已建立的IT2FMO进行相关的应用程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号