Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics

被引:69
作者
Usman, Nighat [1 ]
Usman, Saeeda [2 ]
Khan, Fazlullah [3 ,4 ]
Jan, Mian Ahmad [5 ]
Sajid, Ahthasham [6 ]
Alazab, Mamoun [7 ]
Watters, Paul [8 ]
机构
[1] Bahria Univ, Dept Comp Sci, Lahore, Pakistan
[2] COMSATS Univ Islamabad, Dept Elect & Comp Engn, Sahiwal, Pakistan
[3] Ton Duc Thang Univ, Informetr Res Grp, Ho Chi Minh City 758307, Vietnam
[4] Ton Duc Thang Univ, Fac Informat Technol, Ho Chi Minh City 758307, Vietnam
[5] Abdul Wali Khan Univ Mardan, Dept Comp Sci, Kpk, Pakistan
[6] Balochistan Univ Informat Technol Engn & Manageme, Fac ICT, Dept Comp Sci, Quetta, Balochistan, Pakistan
[7] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT, Australia
[8] La Trobe Univ, Sch Engn & Math Sci, Melbourne, Vic, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 118卷
关键词
Cyber threat; Cyber security; Big data; Severity; Confidence level; Time to live; Machine learning; Essential selected features; Risk score;
D O I
10.1016/j.future.2021.01.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the near future, objects have to connect with each other which can result in gathering private sensitive data and cause various security threats and cyber crimes. To prevent cyber crimes, novel cyber security techniques are required that can identify malicious Internet Protocol (IP) addresses before communication. One of the best techniques is the IP reputation system used for profiling the behavior of security threats to the cyber-physical system. Existing reputation systems do not perform well due to their high management cost, false-positive rate, consumption time, and considering very few data sources for claiming IP address reputation. To overcome the aforementioned issues, we have proposed a novel hybrid approach based on Dynamic Malware Analysis, Cyber Threat Intelligence, Machine Learning (ML), and Data Forensics. Using the concept of big data forensics, IP reputation is predicted in its pre-acceptance stage and its associated zero-day attacks are categorized via behavioral analysis by applying the Decision Tree (DT) technique. The proposed approach highlights the big data forensic issues and computes severity, risk score along with assessing the confidence and lifespan simultaneously. The proposed system is evaluated in two ways; first, we compare the ML techniques to attain the best F-measure, precision and recall scores, and then we compare the entire reputation system with the existing reputation systems. Our proposed framework is not only cross checked with external sources but also able to reduce the security issues which were neglected by existing outdated reputation engines. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:124 / 141
页数:18
相关论文
共 65 条
[1]  
Alam T., 2019, IoT International Journal of Wireless and Microwave Technologies (IJWMT), V9, P1
[2]  
Alhalabi M, 2018, 2018 IEEE INT C RFID, P1, DOI [DOI 10.1109/EEEIC.2018.8494204, 10.1109/ EEEIC.2018.8494204, 10.1109/EEEIC.2018.8494204]
[3]   A survey of botnet detection based on DNS [J].
Alieyan, Kamal ;
ALmomani, Ammar ;
Manasrah, Ahmad ;
Kadhum, Mohammed M. .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (07) :1541-1558
[4]  
Amoli P. V., 2016, INT J DIGIT CONTENT, VVol. 10, P1
[5]  
[Anonymous], 2019, NEURAL COMPUT APPL
[6]  
[Anonymous], 2016, International Journal of Computer Applications
[7]  
Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
[8]  
Athar N, 2020, INT C APPL HUM FACT, P385
[9]  
Ballew P.D., 2020, IP REPUTATION
[10]   Network entity characterization and attack prediction [J].
Bartos, Vaclav ;
Zadnik, Martin ;
Habib, Sheikh Mahbub ;
Vasilomanolakis, Emmanouil .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :674-686