Malware Detection Using Rough Set Based Evolutionary Optimization

被引:1
作者
Jerbi, Manel [1 ]
Dagdia, Zaineb Chelly [2 ,3 ]
Bechikh, Slim [1 ]
Ben Said, Lamjed [1 ]
机构
[1] Univ Tunis, CS Dept, SMART Lab, ISG, Tunis, Tunisia
[2] Univ Paris Saclay, UVSQ, DAVID, Versailles, France
[3] Univ Tunis, ISG, LARODEC, Tunis, Tunisia
来源
NEURAL INFORMATION PROCESSING, ICONIP 2021, PT V | 2021年 / 1516卷
关键词
Evolutionary optimization; Rough set theory; Malware detection;
D O I
10.1007/978-3-030-92307-5_74
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite the existing anti-malware techniques and their interesting achieved results to "hook" attacks, the unstoppable evolution of malware makes the need for more capable malware detection systems overriding. In this paper, we propose a new malware detection technique named Bilevel-Roughset based Malware Detection (BLRDetect) that is based on, and exploits the benefits of, Bilevel optimization and Rough Set Theory. The upper-level of the Bilevel optimization component uses a Genetic Programming Algorithm in its chase of generating powerful detection rules while the lower-level leans on both a Genetic Algorithm and a Rough-Set module to produce high quality, and reliable, malware samples that escape, to their best, the upper-level's generated detection rules. Both levels interact with each other in a competitive way in order to produce populations that depend on one another. Our detection technique has proven its outperformance when tested against various state-of-the-art malware detection systems using common evaluation metrics.
引用
收藏
页码:634 / 641
页数:8
相关论文
共 7 条
[1]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[2]   An overview of bilevel optimization [J].
Colson, Benoit ;
Marcotte, Patrice ;
Savard, Gilles .
ANNALS OF OPERATIONS RESEARCH, 2007, 153 (01) :235-256
[3]   On the use of artificial malicious patterns for android malware detection [J].
Jerbi, Manel ;
Dagdia, Zaineb Chelly ;
Bechikh, Slim ;
Ben Said, Lamjed .
COMPUTERS & SECURITY, 2020, 92
[4]   Coevolution of Mobile Malware and Anti-Malware [J].
Sen, Sevil ;
Aydogan, Emre ;
Aysan, Ahmet I. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) :2563-2574
[5]  
Wei FG, 2017, LECT NOTES COMPUT SC, V10327, P252, DOI 10.1007/978-3-319-60876-1_12
[6]   Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique [J].
Xue, Yinxing ;
Meng, Guozhu ;
Liu, Yang ;
Tan, Tian Huat ;
Chen, Hongxu ;
Sun, Jun ;
Zhang, Jie .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) :1529-1544
[7]   A survey on rough set theory and its applications [J].
Zhang, Qinghua ;
Xie, Qin ;
Wang, Guoyin .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2016, 1 (04) :323-333