Cognitively-Inspired Inference for Malware Task Identification

No Thumbnail Available

Authors

Nunes, Eric
Buto, Casey
Shakarian, Paulo
Lebiere, Christian
Bennati, Stefano
Thomson, Robert

Issue Date

2020-08-01

Type

book-chapter

Language

Keywords

malware identification , instance-based learning , ACT-R , cognitive modeling

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Malware reverse-engineering, specifically, identifying the tasks a given piece of malware was designed to perform (e.g., logging keystrokes, recording video, establishing remote access) is a largely human-driven process that is a difficult and time-consuming operation. In this chapter, we present an automated method to identify malware tasks using two different approaches based on the ACT-R cognitive architecture, a popular implementation of a unified theory of cognition. Using three different malware collections, we explore various evaluations for each of an instance-based and rule-based model—including cases where the training data differs significantly from test; where the malware being evaluated employs packing to thwart analytical techniques; and conditions with sparse training data. We find that our approach based on cognitive inference consistently out-performs the current state-of-the art software for malware task identification as well as standard machine learning approaches—often achieving an unbiased F1 score of over 0.9.

Description

Citation

Nunes, E., Buto, C., Shakarian, P., Lebiere, C., Bennati, S., Thomson, R. (2020). Cognitively-Inspired Inference for Malware Task Identification. In: Tayebi, M.A., Glässer, U., Skillicorn, D.B. (eds) Open Source Intelligence and Cyber Crime. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-41251-7_7

Publisher

Springer International Publishing

License

Journal

Volume

Issue

PubMed ID

ISSN

2190-5428
2190-5436

EISSN