IT2FS-based ontology with soft-computing mechanism for malware behavior analysis

Hsien De Huang, Chang Shing Lee, Mei Hui Wang, Hung-Yu Kao

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

Antimalware application is one of the most important research issues in the area of cyber security threat. Nowadays, because hackers continuously develop novel techniques to intrude into computer systems for various reasons, many security researchers should analyze and track new malicious program to protect sensitive and valuable information in the organization. In this paper, we propose a novel soft-computing mechanism based on the ontology model for malware behavioral analysis: Malware Analysis Network in Taiwan (MAN in Taiwan, MiT). The core techniques of MiT contain two parts listed as follows: (1) collect the logs of network connection, registry, and memory from the operation system on the physical-virtual hybrid analysis environment to get and extract more unknown malicious behavior information. The important information is then extracted to construct the ontology model by using the Web Ontology Language and Fuzzy Markup Language. Additionally, MiT is also able to automatically provide and share samples and reports via the cloud storage mechanism; (2) apply the techniques of Interval Type-2 Fuzzy Set to construct the malware analysis domain knowledge, namely the Interval Type-2 Fuzzy Malware Ontology (IT2FMO), for malware behavior analysis. Simulation results show that the proposed approach can effectively execute the malware behavior analysis, and the constructed system has also released under GNU General Public License version 3. In the future, the system is expected to largely collect and analyze malware samples for providing industries or universities to do related applications via the established IT2FMO.

Original languageEnglish
Pages (from-to)267-284
Number of pages18
JournalSoft Computing
Volume18
Issue number2
DOIs
Publication statusPublished - 2014 Jan 1

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Software
  • Geometry and Topology

Fingerprint Dive into the research topics of 'IT2FS-based ontology with soft-computing mechanism for malware behavior analysis'. Together they form a unique fingerprint.

Cite this