0704-883-0675     |      dataprojectng@gmail.com

AI-DRIVEN TECHNIQUES FOR MALWARE AND MALICIOUS CODE DETECTION

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

ABSTRACT

Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting legitimate users against novel threats in cyberspace. To solve this problem, in this dissertation, we aim to design and develop innovative links between artificial intelligence (AI) and cybersecurity for new defensive techniques against evolving malware attacks and thus help improve security in cyberspace. More specifically, we first study how deep learning models integrating cybersecurity domain knowledge can be designed for intelligent malware detection. In order to comprehensively characterize the complex semantics and social relations among various applications (apps) for malware detection, we propose to utilize both content- and relation-based features and construct structured heterogeneous information networks (i.e., heterogeneous graphs) for data abstraction. Based on the constructed graphs, we propose novel node representation learning techniques and further address the out-of-sample node representation learning problem in malware detection. As the representations of malware could be highly entangled with benign apps in the complex ecosystem of development, to solve this problem, we propose an innovative adversarial disentangler to separate the distinct, informative factors of variations in the observed environment of given apps for evolving malware detection. In addition, we bring an important new insight to exploit social coding properties for the study of code security problem on social coding platforms such as Stack Overflow and GitHub. Last but not least, as AI-driven systems have been widely used in various applications including automatic malware detection, their success may also incentivize attackers to defeat the learning-based models to bypass the detection. To address this challenge, we x 1 further investigate adversarial learning over heterogeneous graph based models to improve their robustness in malware detection. To comprehensively evaluate the proposed techniques for malware and malicious code detection, we conduct extensive experimental studies based on the real-world data collections. The promising results demonstrate the outstanding performance of our proposed models compared with state-of-the-art approaches. Our proposed techniques and developed models can be readily applied to realworld malware and malicious code detection tasks.




FIND OTHER RELATED TOPICS


Related Project Materials

AN EMPIRICAL EXAMINATION OF ENVIRONMENTAL KUZNETS CURVE (EKC) IN WEST AFRICA (1980 – 2012)

ABSTRACT

This study focused on the empirical examination of Environmental Kuznets Curve (EKC) in West Africa and tried to discover whethe...

Read more
AN INVESTIGATION INTO THE EFFECT OF SALES PROMOTION ON THE BUYING DECISION OF CONSUMERS (A CASE STUDY OF GLOBACOM NIGERIA LIMITED)

BACKGROUND OF THE STUDY

Following the beginning of the Industrial Revolution, there was an increase in...

Read more
EFFECT OF DISTRIBUTION STRATEGIES ON CONSUMER BUYING BEHAVIOUR

Background of the <...

Read more
AN APPRAISAL OF RURAL DEVELOPMENT PROGRAMMES IN NIGERIA 1999-2009: AKWA IBOM STATE EXPERIENCE

ABSTRACT

Generally, development has always being to the favour of the urban Areas, thus creating disparities between th...

Read more
ACCOUNTING FOR ENVIRONMENTAL SUSTAINABILITY INITIATIVES IN GOVERNMENTS

ACCOUNTING FOR ENVIRONMENTAL SUSTAINABILITY INITIATIVES IN GOVERNMENTS: This research aims to (i) analyze how governmental accounting practices inc...

Read more
IMPACT OF TEACHING PRACTICES ON THE PRODUCTIVITY OF QUALITY TEACHERS AND SOUND STUDENTS A CASE STUDY OF POLICE CHILDREN SCHOOL, WULARI

ABSTRACT

The only profession that is committed to transmitting knowledge to any level is the teaching profession. It is...

Read more
A CRITICAL ANALYSIS OF JOHN RAWLS’ SECOND PRINCIPLE OF JUSTICE

BACKGROUND OF STUDY

In the history of philosophy, the issue of justice has always been a serious debate. The debate is a...

Read more
EXAMINATION OF COUNSELING AND ITS EFFECT ON THE PSYCHOLOGICAL ADJUSTMENT OF PEOPLE LIVING WITH HIV/AIDS IN NIGERIA

Background of the study

HIV/AIDS has become a threat to public health in Nigeria as a result of its dev...

Read more
THE ROLE OF EARLY CHILDHOOD EDUCATION IN FOSTERING DIPLOMACY

ABSTRACT: This study investigates the role of early childhood education in fostering diplomacy among young children. The objectives are to eva...

Read more
FORECASTING CARGO GROWTH AND REGIONAL ROLE OF THE PORT OF NIGERIA

ABSTRACT

This study was carried out on forecasting cargo growth and regional role of the port of Nigeri...

Read more
Share this page with your friends




whatsapp