Goto

Collaborating Authors

 malware program


Malware families discovery via Open-Set Recognition on Android manifest permissions

Leveni, Filippo, Mistura, Matteo, Iubatti, Francesco, Giangregorio, Carmine, Pastore, Nicolò, Alippi, Cesare, Boracchi, Giacomo

arXiv.org Artificial Intelligence

Malware are malicious programs that are grouped into families based on their penetration technique, source code, and other characteristics. Classifying malware programs into their respective families is essential for building effective defenses against cyber threats. Machine learning models have a huge potential in malware detection on mobile devices, as malware families can be recognized by classifying permission data extracted from Android manifest files. Still, the malware classification task is challenging due to the high-dimensional nature of permission data and the limited availability of training samples. In particular, the steady emergence of new malware families makes it impossible to acquire a comprehensive training set covering all the malware classes. In this work, we present a malware classification system that, on top of classifying known malware, detects new ones. In particular, we combine an open-set recognition technique developed within the computer vision community, namely MaxLogit, with a tree-based Gradient Boosting classifier, which is particularly effective in classifying high-dimensional data. Our solution turns out to be very practical, as it can be seamlessly employed in a standard classification workflow, and efficient, as it adds minimal computational overhead. Experiments on public and proprietary datasets demonstrate the potential of our solution, which has been deployed in a business environment.


How Hackers are using AI Technologies to develop intelligent malware

#artificialintelligence

Artificial intelligence is a double-edged sword that can be used as a security solution or as a weapon by hackers. AI entails developing programs and systems capable of exhibiting traits associated with human behaviors. The characteristics include the ability to adapt to a particular environment or to intelligently respond to a situation. AI technologies have extensively been applied in cybersecurity solutions, but hackers are also leveraging them to develop intelligent malware programs and execute stealth attacks. Security experts have conducted a lot of research to harness the capabilities of AI and incorporate it into security solutions.


Top 5 Disruptive Startups in AI Technology

#artificialintelligence

Our society is transforming at an unbelievable pace today as the industries are being influenced by new-age technologies like machine learning and Artificial Intelligence (AI). We saw tech giant Microsoft unveil Xiaoice, an AI-bot that can place voice calls just like humans, gaming leader NVIDIA joining hands with Nuance to create an AI Marketplace for Diagnostic Imaging, and other big players leveraging the powerful and versatile technology that AI is. However, there are many innovative startups in the AI domain that the disrupting the industries too. Riminder is taking the recruitment process to a whole new level by simplifying and accelerating the hiring process to help recruitment companies find the right candidates easily. Riminder uses deep learning to rank millions of candidates who apply for jobs by comparing their resumes with employees that are currently working as well as others from different parts of the world that fit the job description.


7 Ways Machine Learning Is Already Affecting Your World - respondr.io

#artificialintelligence

What do you think of when someone says "AI" or "Artificial Intelligence"? For most of us, it conjures up an image of the future. It doesn't much evoke the here and now. Artificial intelligence is already out of the box. And while it might not be as slick as the movies, it has vast applications in almost every field, from business to medicine, traffic jams to Facebook photos. Most of us use or benefit from artificial intelligence every day.


Shodan search engine starts unmasking malware command-and-control servers

PCWorld

There's now a new tool that could allow companies to quickly block communications between malware programs and their frequently changing command-and-control servers. Threat intelligence company Recorded Future has partnered with Shodan, a search engine for internet-connected devices and services, to create a new online crawler called Malware Hunter. The new service continuously scans the internet to find control panels for over ten different remote access Trojan (RAT) programs, including Gh0st RAT, DarkComet, njRAT, ZeroAccess and XtremeRAT. These are commercial malware tools sold on underground forums and are used by cybercriminals to take complete control of compromised computers. To identify command-and-control (C&C) servers, the Malware Hunter crawler connects to public Internet Protocol addresses and sends traffic that replicates what these Trojan programs would send to their control panels.


7 Ways Machine Learning Is Already Affecting Your World

#artificialintelligence

What do you think of when someone says "AI" or "Artificial Intelligence"? For most of us, it conjures up an image of the future. It doesn't much evoke the here and now. Artificial intelligence is already out of the box. And while it might not be as slick as the movies, it has vast applications in almost every field, from business to medicine, traffic jams to Facebook photos. Most of us use or benefit from artificial intelligence every day.