6 research outputs found

    ART DESIGN AS A NEW DIRECTION OF MODERN DESIGN DEVELOPMENT

    Get PDF
    In the XX Ć¢ā‚¬ā€œ at the beginning of the XXI century, a process of rapid development of world art and reassessment of artistic values took place in network culture. A new language of art is formed and developed in parallel with the development of the latest technologies. Changing the assessment and reality perception process requires adaptation of design subjects to the new world, in which information flows, opportunities, and scientific and technical innovations are rapidly and steadily growing and transforming. The changing perspective on art objects Ć¢ā‚¬ā€œ from the past to the future Ć¢ā‚¬ā€œ encourages art consumers to acquire a new sense of art going beyond the boundaries of everyday life and makes us relate to the world in a new way, accordingly transforming our everyday life, our desires and feelings. The rapid development and spread of the latest technologies, the entry to a qualitatively new level of visualization leads to the emergence and integration of new, little-researched processes in the field of design, for instance, art design. The purpose of the academic paper is to study the regularities of art design formation as a new trend in developing the modern design sphere, as well as to clarify some practical features of this process. Analytical-bibliographical, systemic-structural, comparative, logical-linguistic methods, abstraction, idealization, analysis, synthesis, induction, deduction were used in the course of the research to study the scientific literature on the art design development, as well as a questionnaire to reveal certain aspects of practical issues in this sphere. Based on the research results, the theoretical and practical aspects of developing art design as a new direction in the field of modern design were studied

    Data Augmentation Based Malware Detection using Convolutional Neural Networks

    Get PDF
    Recently, cyber-attacks have been extensively seen due to the everlasting increase of malware in the cyber world. These attacks cause irreversible damage not only to end-users but also to corporate computer systems. Ransomware attacks such as WannaCry and Petya specifically targets to make critical infrastructures such as airports and rendered operational processes inoperable. Hence, it has attracted increasing attention in terms of volume, versatility, and intricacy. The most important feature of this type of malware is that they change shape as they propagate from one computer to another. Since standard signature-based detection software fails to identify this type of malware because they have different characteristics on each contaminated computer. This paper aims at providing an image augmentation enhanced deep convolutional neural network (CNN) models for the detection of malware families in a metamorphic malware environment. The main contributions of the paper's model structure consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a convolutional neural network model. In the first component, the collected malware samples are converted binary representation to 3-channel images using windowing technique. The second component of the system create the augmented version of the images, and the last component builds a classification model. In this study, five different deep convolutional neural network model for malware family detection is used.Comment: 18 page

    Imageā€based malware classification using VGG19 network and spatial convolutional attention

    Get PDF
    In recent years the amount of malware spreading through the internet and infecting computers and other communication devices has tremendously increased. To date, countless techniques and methodologies have been proposed to detect and neutralize these malicious agents. However, as new and automated malware generation techniques emerge, a lot of malware continues to be produced, which can bypass some stateā€ofā€theā€art malware detection methods. Therefore, there is a need for the classification and detection of these adversarial agents that can compromise the security of people, organizations, and countless other forms of digital assets. In this paper, we propose a spatial attention and convolutional neural network (SACNN) based on deep learning framework for imageā€based classification of 25 wellā€known malware families with and without class balancing. Performance was evaluated on the Malimg benchmark dataset using precision, recall, specificity, precision, and F1 score on which our proposed model with class balancing reached 97.42%, 97.95%, 97.33%, 97.11%, and 97.32%. We also conducted experiments on SACNN with class balancing on benign class, also produced above 97%. The results indicate that our proposed model can be used for imageā€based malware detection with high performance, despite being simpler as compared to other available solutions

    Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)

    Get PDF
    Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture. Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in different brands, including Google Pixel, Motorola, Samsung, and Sony. Notably, the employment of OS leads to a rapid increase in the number of Android users. However, unethical authors tend to develop malware in the devices for wealth, fame, or private purposes. Although practitioners conduct intrusion detection analyses, such as static analysis, there is an inadequate number of review articles discussing the research efforts on this type of analysis. Therefore, this study discusses the articles published from 2009 until 2019 and analyses the steps in the static analysis (reverse engineer, features, and classification) with taxonomy. Following that, the research issue in static analysis is also highlighted. Overall, this study serves as the guidance for novice security practitioners and expert researchers in the proposal of novel research to detect malware through static analysis

    Intrusion detection system for IoT networks for detection of DDoS attacks

    Get PDF
    PhD ThesisIn this thesis, a novel Intrusion Detection System (IDS) based on the hybridization of the Deep Learning (DL) technique and the Multi-objective Optimization method for the detection of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT) networks is proposed. IoT networks consist of different devices with unique hardware and software configurations communicating over different communication protocols, which produce huge multidimensional data that make IoT networks susceptible to cyber-attacks. The network IDS is a vital tool for protecting networks against threats and malicious attacks. Existing systems face significant challenges due to the continuous emergence of new and more sophisticated cyber threats that are not recognized by them, and therefore advanced IDS is required. This thesis focusses especially on the DDoS attack that is one of the cyber-attacks that has affected many IoT networks in recent times and had resulted in substantial devastating losses. A thorough literature review is conducted on DDoS attacks in the context of IoT networks, IDSs available especially for the IoT networks and the scope and applicability of DL methodology for the detection of cyber-attacks. This thesis includes three main contributions for 1) developing a feature selection algorithm for an IoT network fulfilling six important objectives, 2) designing four DL models for the detection of DDoS attacks and 3) proposing a novel IDS for IoT networks. In the proposed work, for developing advanced IDS, a Jumping Gene adapted NSGA-II multi-objective optimization algorithm for reducing the dimensionality of massive IoT data and Deep Learning model consisting of a Convolutional Neural Network (CNN) combined with Long Short-Term Memory (LSTM) for classification are employed. The experimentation is conducted using a High-Performance Computer (HPC) on the latest CISIDS2017 datasets for DDoS attacks and achieved an accuracy of 99.03 % with a 5-fold reduction in training time. The proposed method is compared with machine learning (ML) algorithms and other state-of-the-art methods, which confirms that the proposed method outperforms other approaches.Government of Indi
    corecore