TY - GEN
T1 - An IT2FLS-based malware analysis mechanism
T2 - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013
AU - Huang, Hsien De
AU - Lee, Chang Shing
AU - Wang, Mei Hui
AU - Kao, Hung-Yu
PY - 2013/12/1
Y1 - 2013/12/1
N2 - Malware is one of the problems really existing in the modern post-industrial society. Hackers continuously develop novel techniques to intrude into computer systems for various reasons, so many security researchers should analyze and track new malicious program to protect sensitive information for the computer system. In this paper, we integrate the Interval Type-2 Fuzzy Logic System (IT2FLS) with malware behavioral analysis: Malware Analysis Network in Taiwan (MAN in Taiwan, MiT, and http://MiT.TWMAN.ORG). The core techniques of MiT are as follows: (1) automatically collect the logs the difference operation system to extract unknown behavior information. Also, MiT is able to automatically provide and share samples and reports via the cloud storage mechanism; (2) integrate with IT2FLS to construct the malware analysis domain knowledge for the malware behavior. Simulation results show that the proposed approach can effectively execute the malware behavior analysis, and the constructed system has also been released under GNU General Public License version 3.
AB - Malware is one of the problems really existing in the modern post-industrial society. Hackers continuously develop novel techniques to intrude into computer systems for various reasons, so many security researchers should analyze and track new malicious program to protect sensitive information for the computer system. In this paper, we integrate the Interval Type-2 Fuzzy Logic System (IT2FLS) with malware behavioral analysis: Malware Analysis Network in Taiwan (MAN in Taiwan, MiT, and http://MiT.TWMAN.ORG). The core techniques of MiT are as follows: (1) automatically collect the logs the difference operation system to extract unknown behavior information. Also, MiT is able to automatically provide and share samples and reports via the cloud storage mechanism; (2) integrate with IT2FLS to construct the malware analysis domain knowledge for the malware behavior. Simulation results show that the proposed approach can effectively execute the malware behavior analysis, and the constructed system has also been released under GNU General Public License version 3.
UR - http://www.scopus.com/inward/record.url?scp=84893590750&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893590750&partnerID=8YFLogxK
U2 - 10.1109/SMC.2013.792
DO - 10.1109/SMC.2013.792
M3 - Conference contribution
AN - SCOPUS:84893590750
SN - 9780769551548
T3 - Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013
SP - 4652
EP - 4657
BT - Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013
Y2 - 13 October 2013 through 16 October 2013
ER -