An Intelligent Hybrid Model for the Construction of Expert Systems in Malware Detection

This work has as main objective the development of a hybrid expert system in the identification of malware using the artificial intelligence and fuzzy system approach. Such attacks can harm businesses and individuals by allowing essential data to be misrepresented. To perform the fuzzy rules extraction, the hybrid model was subjected to malware detection tests that were made available in some public datasets and to verify the efficiency of the hybrid approach; it was compared in binary classification tests with hybrid models of fuzzy neural networks and with artificial neural network models. The results obtained in the simulations confirm that the fuzzy neural network approach is feasible to treat malware detection and allows the production of fuzzy rules that can assist in the construction of expert systems.

[1]  Mustaffa Zuriani,et al.  Anomaly Detection in Time Series Data Using Spiking Neural Network , 2018 .

[2]  Michael Benedikt,et al.  Cyberspace: First Steps , 1991 .

[3]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[4]  Wenke Lee,et al.  McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).

[5]  Ali A. Ghorbani,et al.  Detecting Malicious URLs Using Lexical Analysis , 2016, NSS.

[6]  Paulo Vitor de Campos Souza,et al.  Regularized Fuzzy Neural Network Based on Or Neuron for Time Series Forecasting , 2018, NAFIPS.

[7]  Sonia Chiasson,et al.  Technological and Human Factors of Malware Attacks , 2018, ACM Trans. Priv. Secur..

[8]  Jyh-Shing Roger Jang,et al.  ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..

[9]  Witold Pedrycz,et al.  Neurocomputations in Relational Systems , 1991, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Lucas Oliveira Batista,et al.  Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection , 2018, The International Journal of Forensic Computer Science.

[11]  Paulo Vitor de Campos Souza,et al.  Using fuzzy neural networks for improving the prediction of children with autism through mobile devices. , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).

[12]  Fernando Gomide,et al.  New uninorm-based neuron model and fuzzy neural networks , 2010, 2010 Annual Meeting of the North American Fuzzy Information Processing Society.

[13]  Konstantinos Demertzis,et al.  A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security , 2015 .

[14]  Alexandre Gazet,et al.  Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.

[15]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[16]  Francis R. Bach,et al.  Bolasso: model consistent Lasso estimation through the bootstrap , 2008, ICML '08.

[17]  Kang G. Shin,et al.  Large-scale malware indexing using function-call graphs , 2009, CCS.

[18]  Thiago Silva Rezende,et al.  Using Fuzzy Neural Networks Regularized to Support Software for Predicting Autism in Adolescents on Mobile Devices , 2019 .

[19]  Lucas Oliveira Batista,et al.  Utilização de Redes Neurais Nebulosas para criação de um Sistema Especialista em Invasões Cibernéticas , 2018, ICoFCS-2018.

[20]  Konstantinos Demertzis,et al.  Evolving Computational Intelligence System for Malware Detection , 2014, CAiSE Workshops.

[21]  Paulo Vitor de Campos Souza,et al.  Pruning fuzzy neural networks based on unineuron for problems of classification of patterns , 2018, J. Intell. Fuzzy Syst..

[22]  J. Bezdek,et al.  FCM: The fuzzy c-means clustering algorithm , 1984 .

[23]  F. Gomide,et al.  A fast learning algorithm for uninorm-based fuzzy neural networks , 2012, 2012 Annual Meeting of the North American Fuzzy Information Processing Society (NAFIPS).

[24]  Lucas Oliveira Batista,et al.  Evolving fuzzy neural networks to aid in the construction of systems specialists in cyber attacks , 2019, J. Intell. Fuzzy Syst..

[25]  Paulo Vitor de Campos Souza,et al.  Uninorm based regularized fuzzy neural networks , 2018, 2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS).

[26]  D Vasumathi,et al.  Review on anomaly based network intrusion detection system , 2017, 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).

[27]  Lucas Oliveira Batista,et al.  A Hybrid Model Based on Fuzzy Rules to Act on the Diagnosed of Autism in Adults , 2019, AIAI.

[28]  Konstantinos Demertzis,et al.  A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids , 2018 .

[29]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.