Vše

Co hledáte?

Vše
Projekty
Výsledky výzkumu
Subjekty

Rychlé hledání

  • Projekty podpořené TA ČR
  • Významné projekty
  • Projekty s nejvyšší státní podporou
  • Aktuálně běžící projekty

Chytré vyhledávání

  • Takto najdu konkrétní +slovo
  • Takto z výsledků -slovo zcela vynechám
  • “Takto můžu najít celou frázi”

X-ware: a proof of concept malware utilizing artificial intelligence

Identifikátory výsledku

  • Kód výsledku v IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27740%2F22%3A10249262" target="_blank" >RIV/61989100:27740/22:10249262 - isvavai.cz</a>

  • Nalezeny alternativní kódy

    RIV/61989100:27240/22:10249262

  • Výsledek na webu

    <a href="http://ijece.iaescore.com/index.php/IJECE/article/view/25216/15582" target="_blank" >http://ijece.iaescore.com/index.php/IJECE/article/view/25216/15582</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.11591/ijece.v12i2.pp1937-1944" target="_blank" >10.11591/ijece.v12i2.pp1937-1944</a>

Alternativní jazyky

  • Jazyk výsledku

    angličtina

  • Název v původním jazyce

    X-ware: a proof of concept malware utilizing artificial intelligence

  • Popis výsledku v původním jazyce

    Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat&apos;s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus&apos;s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus&apos;s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures. (C) 2022 Institute of Advanced Engineering and Science. All rights reserved.

  • Název v anglickém jazyce

    X-ware: a proof of concept malware utilizing artificial intelligence

  • Popis výsledku anglicky

    Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat&apos;s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus&apos;s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus&apos;s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures. (C) 2022 Institute of Advanced Engineering and Science. All rights reserved.

Klasifikace

  • Druh

    J<sub>SC</sub> - Článek v periodiku v databázi SCOPUS

  • CEP obor

  • OECD FORD obor

    10200 - Computer and information sciences

Návaznosti výsledku

  • Projekt

  • Návaznosti

    S - Specificky vyzkum na vysokych skolach

Ostatní

  • Rok uplatnění

    2022

  • Kód důvěrnosti údajů

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Údaje specifické pro druh výsledku

  • Název periodika

    International Journal of Electrical and Computer Engineering

  • ISSN

    2088-8708

  • e-ISSN

  • Svazek periodika

    12

  • Číslo periodika v rámci svazku

    2

  • Stát vydavatele periodika

    ID - Indonéská republika

  • Počet stran výsledku

    8

  • Strana od-do

    1937-1944

  • Kód UT WoS článku

  • EID výsledku v databázi Scopus

    2-s2.0-85122778849