Inicio  /  Applied Sciences  /  Vol: 11 Par: 14 (2021)  /  Artículo
ARTÍCULO
TITULO

Identifying the Author Group of Malwares through Graph Embedding and Human-in-the-Loop Classification

Dong-Kyu Chae    
Sung-Jun Park    
Eujeanne Kim    
Jiwon Hong and Sang-Wook Kim    

Resumen

Malware are developed for various types of malicious attacks, e.g., to gain access to a user?s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and many companies. Beyond the traditional research areas in this field, including malware detection, malware propagation analysis, and malware family clustering, this paper focuses on identifying the ?author group? of a given malware as a means of effective detection and prevention of further malware threats, along with providing evidence for proper legal action. Our framework consists of a malware-feature bipartite graph construction, malware embedding based on DeepWalk, and classification of the target malware based on the k-nearest neighbors (KNN) classification. However, our KNN classifier often faced ambiguous cases, where it should say ?I don?t know? rather than attempting to predict something with a high risk of misclassification. Therefore, our framework allows human experts to intervene in the process of classification for the final decision. We also developed a graphical user interface that provides the points of ambiguity for helping human experts to effectively determine the author group of the target malware. We demonstrated the effectiveness of our human-in-the-loop classification framework via extensive experiments using real-world malware data.

 Artículos similares

       
 
Hendry - Pratama,Johanes Fernandes Andry     Pág. 81 - 85
PT. Walepay Finansial Teknologi (Walepay) is a Financial Technology Company. In this company, the author wants to know how good Walepay implemented IT Governance. With COBIT 4.1 and Balanced Scorecard, the author will measure the maturity level. The auth... ver más

 
Junfeng Jiao    
Coined by the author, the concept ?transit desert? is developed from the now common concept of a ?food desert,? which is an area where there is limited or no access to fresh food (Clark et al. 2002; Jiao et al. 2012; Whelan et al. 2002; Wrigley 1993; Wri... ver más

 
Klaus Solberg Söilen    
Again, the articles for this issue are mostly about the application of new technology and about business intelligence, reflecting a strong development in corporations. The only exception is the first article, which is purely theoretical.The contribution ... ver más

 
Maja Kiba-Janiak     Pág. 165 - 178
The main purpose of the paper is a development of a reference model of risk management in terms of urban freight transport (UFT) measures? implementation from the perspective of a local authority. What distinguishes this model is a proposition of UFT sta... ver más

 
Jorilson Rodrigues,André Caricatti    
Trata-se de artigo que estuda a viabilidade de identificar a autoria de textos a partir de elementos da lingüística, mais precisamente da pragmática, considerando as inter-relações entre os elementos textuais e objetos externos, ligados a particularidade... ver más