The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins...The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.展开更多
In-vehicle communication has been optimized day to day to keep updated of the technologies.Control area network(CAN)is used as a standard communication method because of its efficient and reliable connection.However,C...In-vehicle communication has been optimized day to day to keep updated of the technologies.Control area network(CAN)is used as a standard communication method because of its efficient and reliable connection.However,CAN is prone to several network level attacks because of its lack in security mechanisms.Various methods have been introduced to incorporate this in CAN.We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means(FCM).The proposed method is light weight and requires less computation time.We performed an extensive experiment and achieved an accuracy of 75.51%with the ML35o in-vehicle intrusion dataset.By experimental result,the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05%and network intrusion detection datasets such as KDDCup with accuracy 60.63%,UNSW_NB15 with accuracy 73.62%and Information Security Center of Excellence(Iscx)with accuracy 74.83%.Overall,the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model.The results of the experiment of our proposed method performed on various intru-sion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.展开更多
文摘The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.
文摘In-vehicle communication has been optimized day to day to keep updated of the technologies.Control area network(CAN)is used as a standard communication method because of its efficient and reliable connection.However,CAN is prone to several network level attacks because of its lack in security mechanisms.Various methods have been introduced to incorporate this in CAN.We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means(FCM).The proposed method is light weight and requires less computation time.We performed an extensive experiment and achieved an accuracy of 75.51%with the ML35o in-vehicle intrusion dataset.By experimental result,the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05%and network intrusion detection datasets such as KDDCup with accuracy 60.63%,UNSW_NB15 with accuracy 73.62%and Information Security Center of Excellence(Iscx)with accuracy 74.83%.Overall,the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model.The results of the experiment of our proposed method performed on various intru-sion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.