Deep Learning-Based Understanding of the Complex Patterns of Cyber Attacks

Deep Learning-Based Understanding of the Complex Patterns of Cyber Attacks

Jayesh Soni
DOI: 10.4018/978-1-6684-4045-2.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cybersecurity attacks are rising both in rate and complexity over time. More development and constant improvement in defensive approaches are needed to secure the operational systems against such attacks. Several malicious attacks pose severe security threats to organizations and users in today's internet age. It is vital to train enhanced malware classification systems to capture the variation in the malware type that belongs to the same family type. In this chapter, the author addresses the malware detection issue using a learning-based approach. First, the author explains various machine learning and deep learning algorithms to solve the problem. Next, the author provides practical implementation by proposing a deep learning-based framework on the open-source benchmark dataset on API calls. The dataset contains API calls during normal and malware-infected processes. The proposed framework trains a hybrid model of convolution neural network followed by long short-term memory to have a high malware detection rate.
Chapter Preview
Top

Introduction

With the increase in digitization, the security of the devices remains a top priority. Access to recent expertise and the latest discoveries through research papers are easy nowadays with the increased proliferation of the internet high-speed network technologies. Such advanced research and findings are available to both; cybercriminals and security analyst, where each one has very different goals. Advanced research in artificial intelligence and machine learning has shown remarkable results in improving the security of such attacks. Nonetheless, cybercriminals use such findings to craft even superior, and more erudite attacks. Even a single attack from such cybercriminals would be a major success, whereas security analysts have to develop a secured system with a 100% successful detection rate. Research shows that in 2017, cybercriminals impacted numerous administrations, corporates, people, and solicitations through various cyberattacks (Larson et al., 2017). Personal identification info, financial data, sensitive data were among the top stolen information. It becomes catastrophic when such information is made available publicly or sold in an illegal market. Cybercrimes are accountable for almost $400 billion in reserves whipped and budgets to lessen harms instigated by crimes (Rimo et al., 2014). With the advent of ransomware attacks, such as wannacry, attackers generate annual revenue of over $1 billion. As defense implements rapidly become outdated, it is progressively more challenging to keep up with the increased complexity of cyber-attacks. It can take days to identify an intrusion. Scalability and intricacy make such attacks challenging. Most wars between countries always have a beginning and end, whereas there is no end in cyberwar, impacting the globe. Cyberattacks are rapidly growing attacks with no sign of downfall from cybercriminals. Such criminals quickly develop new tools and techniques if the previous technique fails. From 2010 onwards, there has been a significant evolution of sophisticated malware infiltrating factories and military systems. Cyber-criminals are evolving rapidly by introducing the complex malware that outsmarts the current malware detection systems. With extraordinary evolution in ransomware, monetization of malware becomes the key. Learning-based algorithms are one of the growing areas that have a high impact in the cyber security domain, and that is the focus of this chapter. In summary, this book chapter makes the following three contributions.

  • 1)

    We proposed a deep learning-based hybrid model composed of a convolution neural network followed by a long short-term memory network for malicious event detection using the Application Programming Interface (API) calls. The CNN algorithm extract the meaningful features from API calls sequences which is passed to LSTM network as input. Next, LSTM will learn the normal behavior of the system using that input. Thus, reduces the training time.

  • 2)

    We performed experimental analysis on real world benchmark dataset and demonstrated that the proposed detection model achieves higher detection rate and in an optimized time compare to baseline models.

The rest of the paper is structured as follows. Section 2 provides some of the background work. Section 3 and 4 explain various machine learning and deep learning algorithms, respectively, for analyzing cyberattacks. Section 5 discusses different hyper-parameters for the neural network. Section 6 discusses the evaluation metrics. Section 7 provides an implementation of malware detection. Finally, the chapter is concluded in section 8 with future work discussion.

Key Terms in this Chapter

URL: Uniform resource locator refers to a file on a network computer.

Encryption: It is the process of transforming the data into a secure format.

UNIX: An operating system widely used for internet servers and workstations.

Polymorphism: It is the concept that describes the situations when there are multiple forms of the same object.

MinMaxScalar: It scales the feature value between 0 and 1.

API: Application programming interface is a list of rules and definitions for developing and integrating the application.

Open Source Benchmark Dataset: Dataset available free to use for research purposes for benchmarking and validating the new proposed implementation and comparative analysis purposes.

Epoch: Number of times the deep learning model goes through the dataset.

Complete Chapter List

Search this Book:
Reset