293,536 research outputs found
Stochastic filtering via L2 projection on mixture manifolds with computer algorithms and numerical examples
We examine some differential geometric approaches to finding approximate
solutions to the continuous time nonlinear filtering problem. Our primary focus
is a new projection method for the optimal filter infinite dimensional
Stochastic Partial Differential Equation (SPDE), based on the direct L2 metric
and on a family of normal mixtures. We compare this method to earlier
projection methods based on the Hellinger distance/Fisher metric and
exponential families, and we compare the L2 mixture projection filter with a
particle method with the same number of parameters, using the Levy metric. We
prove that for a simple choice of the mixture manifold the L2 mixture
projection filter coincides with a Galerkin method, whereas for more general
mixture manifolds the equivalence does not hold and the L2 mixture filter is
more general. We study particular systems that may illustrate the advantages of
this new filter over other algorithms when comparing outputs with the optimal
filter. We finally consider a specific software design that is suited for a
numerically efficient implementation of this filter and provide numerical
examples.Comment: Updated and expanded version published in the Journal reference
below. Preprint updates: January 2016 (v3) added projection of Zakai Equation
and difference with projection of Kushner-Stratonovich (section 4.1). August
2014 (v2) added Galerkin equivalence proof (Section 5) to the March 2013 (v1)
versio
Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
The development and evolution of malware including computer viruses, worms,
and trojan horses, is shown to be closely analogous to the process of community
succession long recognized in ecology. In particular, both changes in the
overall environment by external disturbances, as well as, feedback effects from
malware competition and antivirus coevolution have driven community succession
and the development of different types of malware with varying modes of
transmission and adaptability.Comment: 13 pages, 3 figure
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph
As the security landscape evolves over time, where thousands of species of
malicious codes are seen every day, antivirus vendors strive to detect and
classify malware families for efficient and effective responses against malware
campaigns. To enrich this effort, and by capitalizing on ideas from the social
network analysis domain, we build a tool that can help classify malware
families using features driven from the graph structure of their system calls.
To achieve that, we first construct a system call graph that consists of system
calls found in the execution of the individual malware families. To explore
distinguishing features of various malware species, we study social network
properties as applied to the call graph, including the degree distribution,
degree centrality, average distance, clustering coefficient, network density,
and component ratio. We utilize features driven from those properties to build
a classifier for malware families. Our experimental results show that
influence-based graph metrics such as the degree centrality are effective for
classifying malware, whereas the general structural metrics of malware are less
effective for classifying malware. Our experiments demonstrate that the
proposed system performs well in detecting and classifying malware families
within each malware class with accuracy greater than 96%.Comment: Mathematical Problems in Engineering, Vol 201
- …