0704-883-0675     |      dataprojectng@gmail.com

AI-DRIVEN TECHNIQUES FOR MALWARE AND MALICIOUS CODE DETECTION

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 5000

ABSTRACT

Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting legitimate users against novel threats in cyberspace. To solve this problem, in this dissertation, we aim to design and develop innovative links between artificial intelligence (AI) and cybersecurity for new defensive techniques against evolving malware attacks and thus help improve security in cyberspace. More specifically, we first study how deep learning models integrating cybersecurity domain knowledge can be designed for intelligent malware detection. In order to comprehensively characterize the complex semantics and social relations among various applications (apps) for malware detection, we propose to utilize both content- and relation-based features and construct structured heterogeneous information networks (i.e., heterogeneous graphs) for data abstraction. Based on the constructed graphs, we propose novel node representation learning techniques and further address the out-of-sample node representation learning problem in malware detection. As the representations of malware could be highly entangled with benign apps in the complex ecosystem of development, to solve this problem, we propose an innovative adversarial disentangler to separate the distinct, informative factors of variations in the observed environment of given apps for evolving malware detection. In addition, we bring an important new insight to exploit social coding properties for the study of code security problem on social coding platforms such as Stack Overflow and GitHub. Last but not least, as AI-driven systems have been widely used in various applications including automatic malware detection, their success may also incentivize attackers to defeat the learning-based models to bypass the detection. To address this challenge, we x 1 further investigate adversarial learning over heterogeneous graph based models to improve their robustness in malware detection. To comprehensively evaluate the proposed techniques for malware and malicious code detection, we conduct extensive experimental studies based on the real-world data collections. The promising results demonstrate the outstanding performance of our proposed models compared with state-of-the-art approaches. Our proposed techniques and developed models can be readily applied to realworld malware and malicious code detection tasks.




FIND OTHER RELATED TOPICS


Related Project Materials

An evaluation of export credit facilities’ impact on Nigeria’s trade performance: Evidence from the Nigerian Export–Import Bank (2000–2020).

Background of the Study:

Export credit facilities are designed to provide financial support to exporters, thereby enhancing international...

Read more
RELATIONSHIP BETWEEN CULTURAL TOURISM AND COMMUNITY DEVELOPMENT IN UMUAGBOM COMMUNITY IN IMO STATE.

Abstract

 

This study examines the relationship between cultural tourism and community devel...

Read more
An assessment of digital marketing tool effectiveness on customer acquisition in banking: a case study of Access Bank Nigeria

Background of the Study
Digital marketing has transformed customer acquisition strategies in the banking sector by providin...

Read more
Challenges of Freelance Journalism in Kano Municipal LGA, Kano State

Background of the Study

Freelance journalism has become increasingly popular as traditional media outlets face financial...

Read more
FEMALE CIVIL SERVANTS’ PERCEPTION AND PATTERN OF USE OF NEW MEDIA IN SOUTH EAST NIGERIA

 Background of the Study

Historically the Internet emerged in the early 1970’s as a product of research which aimed to connect...

Read more
An Evaluation of ATM Maintenance Strategies on Reducing Service Downtimes in Banking: A Case Study of AB Microfinance Bank

Background of the Study

In today’s fast-paced financial landscape, automated teller machines (ATMs) are vital for...

Read more
DESIGN AND IMPLEMENTATION OF A WEB-BASED SOCIAL NETWORK SITE

Abstract

Individuals are grouped into particular groupings, such as tiny rural communities or a neighborhood subdivision, through social...

Read more
An evaluation of support services for students with autism spectrum disorder in Jalingo LGA, Taraba State

Background of the Study
The prevalence of autism spectrum disorder (ASD) among students has become a critical concern for...

Read more
USER SATISFACTION WITH ARCHITECTURAL DESIGN OF SPACES IN RESIDENTIAL BUILDINGS: INSIGHTS FROM LOW-COST HOUSING IN PLATEAU STATE, NIGERIA

ABSTRACT

User satisfaction with residential houses generally is tied to many variables, but this research aims at examining user satisfac...

Read more
The Role of Accounting Information System in Enhancing Accountability in Soba Local Government Area

Background of the Study

Accountability in local government institutions is essential f...

Read more
Share this page with your friends




whatsapp