091-2230-8145     |      dataprojectng@gmail.com

AI-DRIVEN TECHNIQUES FOR MALWARE AND MALICIOUS CODE DETECTION

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

ABSTRACT

Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting legitimate users against novel threats in cyberspace. To solve this problem, in this dissertation, we aim to design and develop innovative links between artificial intelligence (AI) and cybersecurity for new defensive techniques against evolving malware attacks and thus help improve security in cyberspace. More specifically, we first study how deep learning models integrating cybersecurity domain knowledge can be designed for intelligent malware detection. In order to comprehensively characterize the complex semantics and social relations among various applications (apps) for malware detection, we propose to utilize both content- and relation-based features and construct structured heterogeneous information networks (i.e., heterogeneous graphs) for data abstraction. Based on the constructed graphs, we propose novel node representation learning techniques and further address the out-of-sample node representation learning problem in malware detection. As the representations of malware could be highly entangled with benign apps in the complex ecosystem of development, to solve this problem, we propose an innovative adversarial disentangler to separate the distinct, informative factors of variations in the observed environment of given apps for evolving malware detection. In addition, we bring an important new insight to exploit social coding properties for the study of code security problem on social coding platforms such as Stack Overflow and GitHub. Last but not least, as AI-driven systems have been widely used in various applications including automatic malware detection, their success may also incentivize attackers to defeat the learning-based models to bypass the detection. To address this challenge, we x 1 further investigate adversarial learning over heterogeneous graph based models to improve their robustness in malware detection. To comprehensively evaluate the proposed techniques for malware and malicious code detection, we conduct extensive experimental studies based on the real-world data collections. The promising results demonstrate the outstanding performance of our proposed models compared with state-of-the-art approaches. Our proposed techniques and developed models can be readily applied to realworld malware and malicious code detection tasks.




FIND OTHER RELATED TOPICS


Related Project Materials

THE IMPACT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON STUDENTS’ ACADEMIC PERFORMANCE IN MATHEMATICS

Background to the Study

Mathematics and its applications have evolved significantly. The introduction of computation and...

Read more
THE USE OF STATE BROADCAST MEDIA AS PROPAGANDA MACHINERY BY STATE GOVERNMENT

ABSTRACT

In several quarters, there have been allegation making round, that state governments u...

Read more
THE ROLE OF POLITICAL PARTIES IN POLITICAL MOBILIZATION: A CASE STUDY OF THE PEOPLE’S DEMOCRATIC PARTY (PDP) IN BIDA EMIRATE OF NIGER STATE, 2011-2015

Abstract

This study assessed the role as well as the strategies of political mobilization employed by the Peoples‟ Democratic Party (PDP)...

Read more
MOTIVATION: A CATALYST FOR ENHANCED PRODUCTIVITY

EXCERPT FROM THE STUDY

  1. There is statistically significant relationship between productivity and motivation.
  2. ...

    Read more
    UTILIZATION OF CAPITAL BUDGETING AS AN OPTIMAL TOOL FOR INVESTMENT ANALYSIS IN MANUFACTURING COMPANIES IN ENUGU AND ANAMBRA STATES

    INTRODUCTION Background of the Study

    A company is a form of business organization, a corporate body or a corporation, generally registe...

    Read more
    DESIGN AND IMPLEMENTATION OF AN ONLINE COMPUTER BASED TEST (CBT) SYSTEM (A CASE STUDY OF SPRINGLIGHT ICT ACADEMY, UYO)

      1. Background of the study

    It is widely believed that all tests will one day...

    Read more
    THE IMPACT OF THE MEDIA IN PROMOTING GOOD GOVERNANCE IN NIGERIA (A CASE STUDY OF VANGUARD NEWSPAPER)

    Background to the Study

    In today’s world of modern governance throughout the world, the issue of...

    Read more
    THE ROLE OF AUDITING IN ENSURING ORGANIZATIONAL EFFECTIVENESS

    BACKGROUND OF THE STUDY

    Corporate performance management is the area of business intelligence involved with monitoring a...

    Read more
    THE EFFECT OF MANAGEMENT STYLES ON WORKERS PRODUCTIVITY IN THE HOTEL INDUSTRY

    BACKGROUND OF THE SUBJECT MATER

    It has been noted that the efficiency and the productivity level of the...

    Read more
    THE ROLE OF PERSONNEL DEPARTMENT IN MANPOWER TRAINING AND DEVELOPMENT

    ABSTRACT

    This study was carried out to examine the role of personnel department in manpower training and dev...

    Read more
    Share this page with your friends




whatsapp