Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments

被引:1
作者
Cuzzocrea A. [1 ,2 ]
Martinelli F. [3 ]
Mercaldo F. [3 ]
Grasso G.M. [4 ]
机构
[1] DIA Department, University of Trieste and ICAR-CNR, Trieste
[2] ICAR-CNR, Rende
[3] IIT Institute, National Research Council, Pisa
[4] COSPECS Department, University of Messina, Messina
基金
欧盟地平线“2020”;
关键词
Complex environments; Machine learning; Security;
D O I
10.1007/s40860-018-0072-3
中图分类号
学科分类号
摘要
This paper proposes applying and experimentally assessing machine learning tools to solve security issues in complex environments, specifically identifying and analyzing malicious behaviors. To evaluate the effectiveness of machine learning algorithms to detect anomalies, we consider the following three real-world case studies: (i) detecting and analyzing Tor traffic, on the basis of a machine learning-based discrimination technique; (ii) identifying and analyzing CAN bus attacks via deep learning; (iii) detecting and analyzing mobile malware, with particular regard to ransomware in Android environments, by means of structural entropy-based classification. Derived observations confirm the effectiveness of machine learning in supporting security of complex environments. © 2018, Springer Nature Switzerland AG.
引用
收藏
页码:225 / 245
页数:20
相关论文
共 79 条
[1]  
Dissecting the Android Bouncer, (2015)
[2]  
Addision P.S., The illustrated wavelet transform handbook: introductory theory and applications in science, engineering, medicine and finance, (2002)
[3]  
Al-Kahtani M.S., Survey on security attacks in vehicular ad hoc networks (Vanets), 6Th International Conference on Signal Processing and Communication Systems (ICSPCS), 2012, pp. 1-9, (2012)
[4]  
Al-rimy B.A.S., Maarof M.A., Shaid S.Z.M., Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions, Comput Secur, (2018)
[5]  
Andronio N., Zanero S., Maggi F., Heldroid: Dissecting and detecting mobile ransomware, International Workshop on Recent Advances in Intrusion Detection, pp. 382-404, (2015)
[6]  
Athanasiadis I.N., Kaburlasos V.G., Mitkas P.A., Petridis V., Applying Machine Learning Techniques on Air Quality Data for Real-Time Decision Support, (2003)
[7]  
Baccouche M., Mamalet F., Wolf C., Garcia C., Baskurt A., Sequential deep learning for human action recognition, International Workshop on Human Behavior Understanding, pp. 29-39, (2011)
[8]  
Barker J., Hannay P., Szewczyk P., Using traffic analysis to identify the second generation onion router, IFIP 9Th International Conference on Embedded and Ubiquitous Computing (EUC), 2011, pp. 72-78, (2011)
[9]  
Battista P., Mercaldo F., Nardone V., Santone A., Visaggio C.A., Identification of android malware families with model checking, In: Proceedings of the 2Nd International Conference on Information Systems Security and Privacy, ICISSP 2016, pp. 542-547, (2016)
[10]  
Baysa D., Low R.M., Stamp M., Structural entropy and metamorphic malware, J Comput Virol Hacking Tech, 9, 4, pp. 179-192, (2013)