Intelligent Malware - Trends and Possibilities
In recent months and years, with more and more computers and computer systems becoming the target of cyberattacks. These attacks are gaining strength and the sophistication of the approach in terms of how to attack. Attackers and Defenders are increasingly using artificial intelligence methods to maximize the success of their actions. For a successful defence, we must be able to anticipate future threats that may come. For these reasons, our research group is engaged in creating experimental software with artificial intelligence to test the possibilities and capabilities of such malware in the event of its deployment. This software has not only malware capabilities but also antimalware and can be used on both sides. This article introduces the reader to the main principles of our design, which can serve as a future platform for cyber defence systems.
Amer, E., and Zelinka, I. A dynamic windows malware detection and prediction method based on contextual understanding of api call sequence. Computers & Security 92 (2020), 101760.
Anderson, H. S., Kharkar, A., Filar, B., Evans, D., and Roth, P. Learning to evade static pe machine learning malware models via reinforcement learning. arXiv preprint arXiv:1801.08917 (2018).
Bekerman, D., Shapira, B., Rokach, L., and Bar, A. Unknown malware detection using network traffic classification. In 2015 IEEE Conference on Communications and Network Security (CNS) (2015), IEEE, pp. 134-142.
Bose, S., Barao, T., and Liu, X. Explaining ai for malware detection: Analysis of mechanisms of malconv. In 2020 International Joint Conference on Neural Networks (IJCNN) (2020), IEEE, pp. 1-8.
Case, D. U. Analysis of the cyber attack on the ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 (2016).
Clarke, R. A., and Knake, R. K. Cyber war. Tantor Media, Incorporated Old Saybrook, 2014.
Kolosnjaji, B., Eraisha, G., Webster, G., Zarras, A., and Eckert, C. Empowering convolutional networks for malware classification and analysis. In 2017 International Joint Conference on Neural Networks (IJCNN) (2017), IEEE, pp. 3838-3845.
Kolosnjaji, B., Zarras, A., Webster, G., and Eckert, C. Deep learning for classification of malware system call sequences. In Australasian Joint Conference on Artificial Intelligence (2016), Springer, pp. 137-149.
Leech, M. D. SOCKS Protocol Version 5. RFC 1928, Mar. 1996.
Lysenko, S. Self-adaptive method for the computer systems resilience in the presence of cyberthreads. RADIOELECTRONIC AND COMPUTER SYSTEMS, 4 (2019), 4-16.
Mayer, M. Artificial intelligence and cyber power from a strategic perspective. Forsvarets hogskole, IFS Insights (2018).
Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., and Nicholas, C. Malware detection by eating a whole exe. arXiv preprint arXiv:1710.09435 (2017).
Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Van Steen, M., Freiling, F. C., and Pohlmann, N. Sandnet: Network traffic analysis of malicious software. In Proceedings of the First Workshop on Building Analysis Datasets
and Gathering Experience Returns for Security (2011), pp. 78-88.
Sharikov, P. Artificial intelligence, cyberattack, and nuclear weapons|a dangerous combination. Bulletin of the Atomic Scientists 74, 6 (2018), 368-373.
Thanh, C., and Zelinka, I. A survey on artificial intelligence in malware as next-generation threats. MENDEL 25, 2 (Dec. 2019), 27-34.
Truong, T., Diep, Q., Zelinka, I., and Dao, T. X-swarm: The upcoming swarm worm. MENDEL 26, 1 (Aug. 2020), 7-14.
Zelinka, I., Das, S., Sikora, L., and Senkerik, R. Swarm virus-next-generation virus and antivirus paradigm? Swarm and Evolutionary Computation 43 (2018), 207-224.
Copyright (c) 2021 MENDEL
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
MENDEL open access articles are normally published under a Creative Commons Attribution-NonCommercial-ShareAlike (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ . Under the CC BY-NC-SA 4.0 license permitted 3rd party reuse is only applicable for non-commercial purposes. Articles posted under the CC BY-NC-SA 4.0 license allow users to share, copy, and redistribute the material in any medium of format, and adapt, remix, transform, and build upon the material for any purpose. Reusing under the CC BY-NC-SA 4.0 license requires that appropriate attribution to the source of the material must be included along with a link to the license, with any changes made to the original material indicated.