4.7 Article

A three-way decision making approach to malware analysis using probabilistic rough sets

Journal

INFORMATION SCIENCES
Volume 374, Issue -, Pages 193-209

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2016.09.037

Keywords

Malware analysis; Probabilistic rough sets; Three-way decisions; Information-theoretic rough sets; Game-theoretic rough sets

Funding

  1. NSERC Canada

Ask authors/readers for more resources

Malware analysis aims to identify malware by examining applications behaviour on the host operating system. A common issue in malware analysis is how to mitigate and handle the false decisions such as false positives. Existing approaches which are based on two-way decisions (such as acceptance and rejection) for classifying applications behaviour result in two shortcomings. Firstly, the two-way decisions are rigid and strict in the sense that they demand that a classification decision must be made irrespective of the quality of available information. This potentially leads to wrong classification decisions whenever we do not have sufficient and complete information. Secondly, two-way decisions do not involve any explicit mechanism for dealing with the false decisions at the model level. The existing approaches generally work like an add-on to learning models and are only exercised after incorrect decisions are being made by the learning models. This results in additional processing and increases the complexity of the task. In this paper, we investigate a three-way decision making approach based on decisions of acceptance, rejection or deferment. The added deferment decision option provides flexibility for delaying a certain decision whenever we do not have sufficient information. Moreover, it aims to mitigate the false decisions at the model level by determining a tradeoff between different properties of decision making such as accuracy, generality and uncertainty. We considered three-way decisions based on two probabilistic rough set models, namely, game-theoretic rough sets (GTRS) and information-theoretic rough sets (ITRS) in this study. An architecture of malware analysis realized with probabilistic rough sets based three-way decisions is proposed. A new algorithm termed as sequentially stackable linux security (SSLS) based on the proposed architecture is presented. Experimental results-on the system call sequences from the UNM data set advocate for the use of three-way decisions in malware analysis. (C) 2016 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

A three-way clustering approach for handling missing data using GTRS

Mohammad Khan Afridi, Nouman Azam, JingTao Yao, Eisa Alanazi

INTERNATIONAL JOURNAL OF APPROXIMATE REASONING (2018)

Article Computer Science, Information Systems

Game theoretic approach to shadowed sets: A three-way tradeoff perspective

Yan Zhang, JingTao Yao

INFORMATION SCIENCES (2020)

Article Computer Science, Artificial Intelligence

Variance based three-way clustering approaches for handling overlapping clustering

Mohammad Khan Afridi, Nouman Azam, JingTao Yao

INTERNATIONAL JOURNAL OF APPROXIMATE REASONING (2020)

Article Physics, Multidisciplinary

A three-way clustering method based on an improved DBSCAN algorithm

Hui Yu, LuYuan Chen, JingTao Yao, XingNan Wang

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

A three-way density peak clustering method based on evidence theory

Hui Yu, LuYuan Chen, JingTao Yao

Summary: The paper introduces a three-way density peak clustering method based on evidence theory to address the issue of cluster label error propagation. The method involves finding cluster centers, using midrange distance comparison to detect positive regions, and allocating remaining objects to appropriate clusters. Experimental results show that the method effectively finds clusters and aligns with human cognition.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

A spatial filtering inspired three-way clustering approach with application to outlier detection

Bahar Ali, Nouman Azam, Anwar Shah, JingTao Yao

Summary: Three-way clustering is effective for handling uncertain, imprecise, and incomplete data, utilizing reduction and elevation operations to create core and support clusters. Experimental results show that RE3WC can detect additional outliers compared to other clustering algorithms, resulting in more compact and precise clusters. Additionally, RE3WC yields comparable results to notable approaches such as LOF, LoOP, ABOD, and IF.

INTERNATIONAL JOURNAL OF APPROXIMATE REASONING (2021)

Article Computer Science, Information Systems

A three-way clustering approach for novelty detection

Anwar Shah, Nouman Azam, Bahar Ali, Muhammad Taimoor Khan, JingTao Yao

Summary: Novelty detection aims to identify novel instances in test data that differ from normal instances in training data. The key challenge is to effectively classify normal instances and reject classification of novel instances. Three-way decisions are a useful strategy to address this challenge.

INFORMATION SCIENCES (2021)

Editorial Material Computer Science, Artificial Intelligence

Formal concept analysis, rough sets, and three-way decisions

JingTao Yao, Jesus Medina, Yan Zhang, Dominik Slezak

Summary: Formal concept analysis, rough sets, and three-way decisions are prominent theories and methods for data representation and analysis, widely applied to data mining, machine learning, artificial intelligence, etc.

INTERNATIONAL JOURNAL OF APPROXIMATE REASONING (2022)

Article Computer Science, Hardware & Architecture

A privacy enhancing model for Internet of Things using three-way decisions and differential privacy

Waqas Ali, Mohammad Nauman, Nouman Azam

Summary: The recent advancements in IoT have brought significant advantages for businesses, but the protection of data privacy has become an important research challenge. Differential privacy, a new technique, anonymizes sensitive attributes to protect data privacy. A key issue in existing studies is the costly manual division of attribute sets by domain experts. This paper introduces a three-way approach for differential privacy and an algorithm for attribute set division, demonstrating considerable improvement in information content and dataset stability.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware

Kaleem Nawaz Khan, Najeeb Ullah, Sikandar Ali, Muhammad Salman Khan, Mohammad Nauman, Anwar Ghani

Summary: Android is a leading operating system for smartphones, but it is also targeted by attackers. To address this security issue, researchers have developed a novel technique called Op2Vec for embedding operation codes (opcodes) to enable the end-to-end detection of Android malware using deep learning models. Recent experiments have shown promising results, with an average detection accuracy of 97.47%, precision of 0.976, and F1 score of 0.979.

SECURITY AND COMMUNICATION NETWORKS (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Modeling Use-Oriented Attribute Importance with the Three-Way Decision Theory

Xin Cui, JingTao Yao, Yiyu Yao

ROUGH SETS, IJCRS 2020 (2020)

Proceedings Paper Computer Science, Information Systems

Toward a Three-way Image Classification Model: A Case Study on Corn Grain Images

Sergio Silva Ribeiro, JingTao Yao

2019 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2019) (2019)

Article Information Science & Library Science

Toward a model of the municipal evidence-based decision process in the strategic digital city context

Sergio Silva Ribeiro, Denis Alcides Rezende, Jingtao Yao

INFORMATION POLITY (2019)

Proceedings Paper Computer Science, Information Systems

Discovering IMRaD Structure with Different Classifiers

Sergio Silva Ribeiro, JingTao Yao, Denis Alcides Rezende

2018 9TH IEEE INTERNATIONAL CONFERENCE ON BIG KNOWLEDGE (ICBK) (2018)

Article Computer Science, Information Systems

Deep neural architectures for large scale android malware analysis

Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A consensus model considers managing manipulative and overconfident behaviours in large-scale group decision-making

Xia Liang, Jie Guo, Peide Liu

Summary: This paper investigates a novel consensus model based on social networks to manage manipulative and overconfident behaviors in large-scale group decision-making. By proposing a novel clustering model and improved methods, the consensus reaching is effectively facilitated. The feedback mechanism and management approach are employed to handle decision makers' behaviors. Simulation experiments and comparative analysis demonstrate the effectiveness of the model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

CGN: Class gradient network for the construction of adversarial samples

Xiang Li, Haiwang Guo, Xinyang Deng, Wen Jiang

Summary: This paper proposes a method based on class gradient networks for generating high-quality adversarial samples. By introducing a high-level class gradient matrix and combining classification loss and perturbation loss, the method demonstrates superiority in the transferability of adversarial samples on targeted attacks.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Distinguishing latent interaction types from implicit feedbacks for recommendation

Lingyun Lu, Bang Wang, Zizhuo Zhang, Shenghao Liu

Summary: Many recommendation algorithms only rely on implicit feedbacks due to privacy concerns. However, the encoding of interaction types is often ignored. This paper proposes a relation-aware neural model that classifies implicit feedbacks by encoding edges, thereby enhancing recommendation performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Proximity-based density description with regularized reconstruction algorithm for anomaly detection

Jaehong Yu, Hyungrok Do

Summary: This study discusses unsupervised anomaly detection using one-class classification, which determines whether a new instance belongs to the target class by constructing a decision boundary. The proposed method uses a proximity-based density description and a regularized reconstruction algorithm to overcome the limitations of existing one-class classification methods. Experimental results demonstrate the superior performance of the proposed algorithm.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Non-iterative border-peeling clustering algorithm based on swap strategy

Hui Tu, Shifei Ding, Xiao Xu, Haiwei Hou, Chao Li, Ling Ding

Summary: Border-Peeling algorithm is a density-based clustering algorithm, but its complexity and issues on unbalanced datasets restrict its application. This paper proposes a non-iterative border-peeling clustering algorithm, which improves the clustering performance by distinguishing and associating core points and border points.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A two-stage denoising framework for zero-shot learning with noisy labels

Long Tang, Pan Zhao, Zhigeng Pan, Xingxing Duan, Panos M. Pardalos

Summary: In this work, a two-stage denoising framework (TSDF) is proposed for zero-shot learning (ZSL) to address the issue of noisy labels. The framework includes a tailored loss function to remove suspected noisy-label instances and a ramp-style loss function to reduce the negative impact of remaining noisy labels. In addition, a dynamic screening strategy (DSS) is developed to efficiently handle the nonconvexity of the ramp-style loss.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Selection of a viable blockchain service provider for data management within the internet of medical things: An MCDM approach to Indian healthcare

Raghunathan Krishankumar, Sundararajan Dhruva, Kattur S. Ravichandran, Samarjit Kar

Summary: Health 4.0 is gaining global attention for better healthcare through digital technologies. This study proposes a new decision-making framework for selecting viable blockchain service providers in the Internet of Medical Things (IoMT). The framework addresses the limitations in previous studies and demonstrates its applicability in the Indian healthcare sector. The results show the top ranking BSPs, the importance of various criteria, and the effectiveness of the developed model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Q-learning with heterogeneous update strategy

Tao Tan, Hong Xie, Liang Feng

Summary: This paper proposes a heterogeneous update idea and designs HetUp Q-learning algorithm to enlarge the normalized gap by overestimating the Q-value corresponding to the optimal action and underestimating the Q-value corresponding to the other actions. To address the limitation, a softmax strategy is applied to estimate the optimal action, resulting in HetUpSoft Q-learning and HetUpSoft DQN. Extensive experimental results show significant improvements over SOTA baselines.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Dyformer: A dynamic transformer-based architecture for multivariate time series classification

Chao Yang, Xianzhi Wang, Lina Yao, Guodong Long, Guandong Xu

Summary: This paper proposes a dynamic transformer-based architecture called Dyformer for multivariate time series classification. Dyformer captures multi-scale features through hierarchical pooling and adaptive learning strategies, and improves model performance by introducing feature-map-wise attention mechanisms and a joint loss function.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

ESSENT: an arithmetic optimization algorithm with enhanced scatter search strategy for automated test case generation

Xiguang Li, Baolu Feng, Yunhe Sun, Ammar Hawbani, Saeed Hammod Alsamhi, Liang Zhao

Summary: This paper proposes an enhanced scatter search strategy, using opposition-based learning, to solve the problem of automated test case generation based on path coverage (ATCG-PC). The proposed ESSENT algorithm selects the path with the lowest path entropy among the uncovered paths as the target path and generates new test cases to cover the target path by modifying the dimensions of existing test cases. Experimental results show that the ESSENT algorithm outperforms other state-of-the-art algorithms, achieving maximum path coverage with fewer test cases.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

An attention based approach for automated account linkage in federated identity management

Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Aytaj Badirova, Ralph Krimmel, Christof Pohl, Ramin Yahyapour

Summary: Linking digital accounts belonging to the same user is crucial for security, user satisfaction, and next-generation service development. However, research on account linkage is mainly focused on social networks, and there is a lack of studies in other domains. To address this, we propose SmartSSO, a framework that automates the account linkage process by analyzing user routines and behavior during login processes. Our experiments on a large dataset show that SmartSSO achieves over 98% accuracy in hit-precision.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A memetic algorithm with fuzzy-based population control for the joint order batching and picker routing problem

Renchao Wu, Jianjun He, Xin Li, Zuguo Chen

Summary: This paper proposes a memetic algorithm with fuzzy-based population control (MA-FPC) to solve the joint order batching and picker routing problem (JOBPRP). The algorithm incorporates batch exchange crossover and a two-level local improvement procedure. Experimental results show that MA-FPC outperforms existing algorithms in terms of solution quality.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection

Guoxiang Zhong, Fagui Liu, Jun Jiang, Bin Wang, C. L. Philip Chen

Summary: In this study, we propose the AMFormer framework to address the problem of mixed normal and anomaly samples in deep unsupervised time-series anomaly detection. By refining the one-class representation and introducing the masked operation mechanism and cost sensitive learning theory, our approach significantly improves anomaly detection performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A data-driven optimisation method for a class of problems with redundant variables and indefinite objective functions

Jin Zhou, Kang Zhou, Gexiang Zhang, Ferrante Neri, Wangyang Shen, Weiping Jin

Summary: In this paper, the authors focus on the issue of multi-objective optimisation problems with redundant variables and indefinite objective functions (MOPRVIF) in practical problem-solving. They propose a dual data-driven method for solving this problem, which consists of eliminating redundant variables, constructing objective functions, selecting evolution operators, and using a multi-objective evolutionary algorithm. The experiments conducted on two different problem domains demonstrate the effectiveness, practicality, and scalability of the proposed method.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A Monte Carlo fuzzy logistic regression framework against imbalance and separation

Georgios Charizanos, Haydar Demirhan, Duygu Icen

Summary: This article proposes a new fuzzy logistic regression framework that addresses the problems of separation and imbalance while maintaining the interpretability of classical logistic regression. By fuzzifying binary variables and classifying subjects based on a fuzzy threshold, the framework demonstrates superior performance on imbalanced datasets.

INFORMATION SCIENCES (2024)