Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/34483
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chowdhury, Ipshita Roy | en_UK |
dc.contributor.author | Bhowmik, Deepayan | en_UK |
dc.date.accessioned | 2022-07-06T00:05:37Z | - |
dc.date.available | 2022-07-06T00:05:37Z | - |
dc.date.issued | 2022 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/34483 | - |
dc.description.abstract | Exponential rise of Internet increases the risk of cyber attack related incidents which are generally caused by wide spread frequency of new malware generation. Different types of malware families have complex, dynamic behaviours and characteristics which can cause a novel and targeted attack in a cyber-system. Existence of large volume of malware types with frequent new additions hinders cyber resilience effort. To address the gap, we propose a new ontology driven framework that captures recent malware behaviours. According to code structure malware can be divided into three categories: basic, polymorphic and metamorphic. Packing or code obfuscation is also a technique adopted by the malware developers to make the code unreadable and avoid detection. Given that ontology techniques are useful to express the domain knowledge meaningfully , this paper aims to develop an ontology for dynamic analysis of malware behaviour and to capture metamorphic and polymorphic malware behaviour. This will be helpful to understand malicious behaviour exhibited by new generation malware samples and changes in their code structure. The proposed framework includes 14 malware families with their sub-families and 3 types of malware code-structure with their individuals. With a focus on malware behaviour the proposed ontology depicts the relations among malware families and malware code-structures with their respective behaviour. | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | IEEE | en_UK |
dc.relation | Chowdhury IR & Bhowmik D (2022) Capturing Malware Behaviour with Ontology-based Knowledge Graphs. In: <i>2022 IEEE Conference on Dependable and Secure Computing (DSC)</i>. IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), Edinburgh, 22.06.2022-24.06.2022. Piscataway, NJ, USA: IEEE. https://doi.org/10.1109/DSC54232.2022.9888860 | en_UK |
dc.rights | © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_UK |
dc.subject | Ontology | en_UK |
dc.subject | Malware | en_UK |
dc.subject | Metamorphic | en_UK |
dc.subject | Polymorphic | en_UK |
dc.subject | Packing | en_UK |
dc.title | Capturing Malware Behaviour with Ontology-based Knowledge Graphs | en_UK |
dc.type | Conference Paper | en_UK |
dc.identifier.doi | 10.1109/DSC54232.2022.9888860 | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.type.status | AM - Accepted Manuscript | en_UK |
dc.author.email | deepayan.bhowmik@stir.ac.uk | en_UK |
dc.citation.btitle | 2022 IEEE Conference on Dependable and Secure Computing (DSC) | en_UK |
dc.citation.conferencedates | 2022-06-22 - 2022-06-24 | en_UK |
dc.citation.conferencelocation | Edinburgh | en_UK |
dc.citation.conferencename | IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022) | en_UK |
dc.citation.date | 26/09/2022 | en_UK |
dc.citation.isbn | 978-1-6654-2141-6 | en_UK |
dc.publisher.address | Piscataway, NJ, USA | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.identifier.isi | WOS:000892614100019 | en_UK |
dc.identifier.scopusid | 2-s2.0-85141051441 | en_UK |
dc.identifier.wtid | 1826549 | en_UK |
dc.contributor.orcid | 0000-0003-1762-1578 | en_UK |
dc.date.accepted | 2022-04-30 | en_UK |
dcterms.dateAccepted | 2022-04-30 | en_UK |
dc.date.filedepositdate | 2022-07-03 | en_UK |
rioxxterms.apc | not required | en_UK |
rioxxterms.type | Conference Paper/Proceeding/Abstract | en_UK |
rioxxterms.version | AM | en_UK |
local.rioxx.author | Chowdhury, Ipshita Roy| | en_UK |
local.rioxx.author | Bhowmik, Deepayan|0000-0003-1762-1578 | en_UK |
local.rioxx.project | Internal Project|University of Stirling|https://isni.org/isni/0000000122484331 | en_UK |
local.rioxx.freetoreaddate | 2022-07-05 | en_UK |
local.rioxx.licence | http://www.rioxx.net/licenses/all-rights-reserved|2022-07-05| | en_UK |
local.rioxx.filename | IEEE_DSC_2022_Ontology_final.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
local.rioxx.source | 978-1-6654-2141-6 | en_UK |
Appears in Collections: | Computing Science and Mathematics Conference Papers and Proceedings |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IEEE_DSC_2022_Ontology_final.pdf | Fulltext - Accepted Version | 1.57 MB | Adobe PDF | View/Open |
This item is protected by original copyright |
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.