Fuzzy Markup Language for Malware Behavioral Analysis
In recent years, antimalware applications represented one of the most important research topics in the area of network security threat. In addition, malware have become a growing important problem for governments and commercial organizations. The key point of the research on the network security is to judge and validate the similarity metrics among the malicious software. Indeed, most computer network issues are also caused by malware. As a consequence, one enhanced system to analyze the behavior of malwares is needed to try to predict the malicious actions and to minimize the computer damages caused by the malware. However, the conventional data analysis tools lack the ability to deal with the computer safety because the environments malwares operating are with high levels of imprecision and vagueness. For this reason, we have developed Taiwan Malware Analysis Net (TWMAN) to improve the accuracy of malware behavioral analysis. This chapter tries to explorer and deal with these computer security and safety issues by integrating the semantic technologies and computational intelligence methods, such as the fuzzy ontologies and fuzzy markup language (FML). With the proposed approach, the malware identification has achieved a good performance according to the experimental results.
KeywordsMembership Function Fuzzy System Fuzzy Controller Fuzzy Ontology Computational Intelligence Method
Unable to display preview. Download preview PDF.
- 5.Bobillo, F., Straccia, U.: Representing fuzzy ontologies in OWL 2. In: 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, July 18-23 (2010)Google Scholar
- 6.Ho, S.H., Yang, C.L., Chen, C.Y., Hsu, C.Y., Chang, Y.K.: An Intelligent-Mamdani Inference Scheme for Healthcare Applications Based on Fuzzy Markup Language. In: 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN 2009), Kaohsiung, Taiwan, December 14-16 (2009)Google Scholar
- 7.Huang, H.D., Chuang, T.Y., Tsai, Y.L., Lee, C.S.: Ontology-based Intelligent System for Malware Behavioral Analysis. In: 2010 IEEE World Congress on Computational Intelligence (WCCI 2010), Barcelona, Spain, July 18-23 (2010)Google Scholar
- 8.Huang, H.D., Lee, C.S., Kao, H.Y., Tsai, Y.L., Chang, J.G.: Malware Behavioral Analysis System: TWMAN. In: 2011 IEEE Symposium on Computational Intelligence for Intelligent Agent (IEEE SSCI 2011), Paris, France, April 11-15 (2011)Google Scholar
- 9.Huang, H.D., Loia, V., Acampora, G., Lee, C.S., Kao, H.Y.: Applying FML and Fuzzy Ontologies to Malware Behavioral Analysis. In: 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, June 27-30 (2011)Google Scholar
- 10.Hungenberg, T., Eckert, M.: INetSim (2010), http://www.inetsim.org
- 11.Kornblum, J.: ssdeep (2010), http://ssdeep.sourceforge.net
- 13.Lee, C.S., Wang, M.H., Su, M.K., Wu, N.Y., Liu, C.H., Tseng, Y.Y., Wang, Y.L., Wang, H.M.: Fuzzy markup language for university assessment. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2011), Anchorage, Alaska, USA, October 9-12 (2011)Google Scholar
- 14.Lehti, R., Virolainen, P.: AIDE (2011), http://aide.sourceforge.net
- 18.Wang, M.H., Lee, C.S., Hsieh, K.L., Hsu, C.Y., Chang, C.C.: Intelligent ontological multi-agent for healthy diet planning. In: 2009 IEEE International Conference on Fuzzy System (FUZZ-IEEE 2009), Jeju Island, Korea, August 19-24 (2009)Google Scholar
- 19.Zhao, H., Xu, M., Zheng, N., Yao, J., Ho, Q.: Malicious Executables Classification Based on Behavioral Factor Analysis. In: 2010 International Conference on e-Education, e-Business, e-Management and e-Learning, Sanya, China, January 22-24 (2010)Google Scholar