Abstract
Objective: Newborn malware has increased significantly in recent years, becoming more dangerous for many applications. So, researchers are focusing more on solutions that serve the defense of new malware trends and variance, especially zero-day malware attacks. The prime goal of our proposition is to reach a high-security level by defending against malware attacks effectively using advanced techniques.
Methods: In this paper, we propose an Intelligent Cybersecurity Framework specialized in malware attacks in a layered architecture. After receiving the unknown malware, the Framework Core layer uses malware visualization technique to process unknown samples of the malicious software. Then, we classify malware samples into their families using: K-Nearest Neighbor, Decision Tree, and Random Forest algorithms. Classification results are given in the last layer and based on a Malware Behavior Database; we are able to warn users by giving them a detailed report on the malicious behavior of the given malware family. The proposed Intelligent Cybersecurity Framework is implemented in a graphic user interface that is easy to use.
Results: Comparing machine learning classifiers, the Random Forest algorithm gives the best results in the classification task with a precision of 97.6%.
Conclusion: However, we need to take into account the results of the other classifiers for more reliability. Finally, obtained results are efficient and fast, meeting the cybersecurity frameworks' general requirements.
Keywords: Cybersecurity framework, cyber-attacks, malware behavior, malware visualization, machine learning, malware classification.
[http://dx.doi.org/10.1016/j.future.2019.12.028]
[http://dx.doi.org/10.1007/978-981-15-0694-9_6]
[http://dx.doi.org/10.19101/IJACR.2019.940088]
[http://dx.doi.org/10.1145/3286606.3286779]
[http://dx.doi.org/10.1080/19361610.2018.1387734]
[http://dx.doi.org/10.1007/978-3-540-70542-0_6]
[http://dx.doi.org/10.1109/ITACT.2015.7492653]
[http://dx.doi.org/10.13005/ojcst/10.02.20]
[http://dx.doi.org/10.1145/3368756.3369098]
[http://dx.doi.org/10.1109/BigData.2017.8258512]
[http://dx.doi.org/10.4236/jcc.2018.61016]
[http://dx.doi.org/10.4018/IJDCF.2020010105]
[http://dx.doi.org/10.1109/ICASSP.2015.7178304]
[http://dx.doi.org/10.1007/978-3-319-50127-7_11]
[http://dx.doi.org/10.1016/B978-0-08-044894-7.01312-9]