1,915 research outputs found
Improved Detection for Advanced Polymorphic Malware
Malicious Software (malware) attacks across the internet are increasing at an alarming rate. Cyber-attacks have become increasingly more sophisticated and targeted. These targeted attacks are aimed at compromising networks, stealing personal financial information and removing sensitive data or disrupting operations. Current malware detection approaches work well for previously known signatures. However, malware developers utilize techniques to mutate and change software properties (signatures) to avoid and evade detection. Polymorphic malware is practically undetectable with signature-based defensive technologies. Today’s effective detection rate for polymorphic malware detection ranges from 68.75% to 81.25%. New techniques are needed to improve malware detection rates. Improved detection of polymorphic malware can only be accomplished by extracting features beyond the signature realm. Targeted detection for polymorphic malware must rely upon extracting key features and characteristics for advanced analysis. Traditionally, malware researchers have relied on limited dimensional features such as behavior (dynamic) or source/execution code analysis (static). This study’s focus was to extract and evaluate a limited set of multidimensional topological data in order to improve detection for polymorphic malware. This study used multidimensional analysis (file properties, static and dynamic analysis) with machine learning algorithms to improve malware detection. This research demonstrated improved polymorphic malware detection can be achieved with machine learning. This study conducted a number of experiments using a standard experimental testing protocol. This study utilized three advanced algorithms (Metabagging (MB), Instance Based k-Means (IBk) and Deep Learning Multi-Layer Perceptron) with a limited set of multidimensional data. Experimental results delivered detection results above 99.43%. In addition, the experiments delivered near zero false positives. The study’s approach was based on single case experimental design, a well-accepted protocol for progressive testing. The study constructed a prototype to automate feature extraction, assemble files for analysis, and analyze results through multiple clustering algorithms. The study performed an evaluation of large malware sample datasets to understand effectiveness across a wide range of malware. The study developed an integrated framework which automated feature extraction for multidimensional analysis. The feature extraction framework consisted of four modules: 1) a pre-process module that extracts and generates topological features based on static analysis of machine code and file characteristics, 2) a behavioral analysis module that extracts behavioral characteristics based on file execution (dynamic analysis), 3) an input file construction and submission module, and 4) a machine learning module that employs various advanced algorithms. As with most studies, careful attention was paid to false positive and false negative rates which reduce their overall detection accuracy and effectiveness. This study provided a novel approach to expand the malware body of knowledge and improve the detection for polymorphic malware targeting Microsoft operating systems
The use of data-mining for the automatic formation of tactics
This paper discusses the usse of data-mining for the automatic formation of tactics. It was presented at the Workshop on Computer-Supported Mathematical Theory Development held at IJCAR in 2004. The aim of this project is to evaluate the applicability of data-mining techniques to the automatic formation of tactics from large corpuses of proofs. We data-mine information from large proof corpuses to find commonly occurring patterns. These patterns are then evolved into tactics using genetic programming techniques
Automatic discovery of drug mode of action and drug repositioning from gene expression data
2009 - 2010The identification of the molecular pathway that is targeted by a compound,
combined with the dissection of the following reactions in the cellular environment,
i.e. the drug mode of action, is a key challenge in biomedicine.
Elucidation of drug mode of action has been attempted, in the past, with
different approaches. Methods based only on transcriptional responses are
those requiring the least amount of information and can be quickly applied
to new compounds. On the other hand, they have met with limited success
and, at the present, a general, robust and efficient gene-expression based
method to study drugs in mammalian systems is still missing.
We developed an efficient analysis framework to investigate the mode of
action of drugs by using gene expression data only. Particularly, by using
a large compendium of gene expression profiles following treatments with
more than 1,000 compounds on different human cell lines, we were able
to extract a synthetic consensual transcriptional response for each of the
tested compounds. This was obtained by developing an original rank merging
procedure. Then, we designed a novel similarity measure among the
transcriptional responses to each drug, endingending up with a “drug similarity
network”, where each drug is a node and edges represent significant
similarities between drugs.
By means of a novel hierarchical clustering algorithm, we then provided
this network with a modular topology, contanining groups of highly interconnected
nodes (i.e. network communities) whose exemplars form secondlevel
modules (i.e. network rich-clubs), and so on. We showed that these
topological modules are enriched for a given mode of action and that the
hierarchy of the resulting final network reflects the different levels of similarities
among the composing compound mode of actions.
Most importantly, by integrating a novel drug X into this network (which
can be done very quickly) the unknown mode of action can be inferred by
studying the topology of the subnetwork surrounding X. Moreover, novel
potential therapeutic applications can be assigned to safe and approved
drugs, that are already present in the network, by studying their neighborhood
(i.e. drug repositioning), hence in a very cheap, easy and fast way,
without the need of additional experiments.
By using this approach, we were able to correctly classify novel anti-cancer
compounds; to predict and experimentally validate an unexpected similarity
in the mode of action of CDK2 inhibitors and TopoIsomerase inhibitors
and to predict that Fasudil, a known and FDA-approved cardiotonic agent,
could be repositioned as novel enhancer of cellular autophagy.
Due to the extremely safe profile of this drug and its potential ability to
traverse the blood-brain barrier, this could have strong implications in the
treatment of several human neurodegenerative disorders, such as Huntington
and Parkinson diseases. [edited by author]IX n.s
Recommended from our members
An automated method mapping parametric features between computer aided design software
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonEnterprise efficiency is limited by data exchange. A product designer might specify the geometry of a product with a Computer Aided Design program, an engineer might re-use that geometry data to calculate physical properties of the product using a Finite Element Analysis program. These different domains place different requirements on the product representation. Representations of product data required for different tasks is dependent on the vendor software associated with those tasks, sharing data between different vendor programs is limited by incompatibility of the vendor formats used. In the case of Computer Aided Design where the virtual form of an object is modelled, no standard data format captures complete model data. Common data standards transfer model surface geometry without capturing the topological elements from which these geometries are constructed. There are prescriptive data representations to allow these features to be specified in a neutral format, but little incentive for vendors to adopt these schemes. Recent efforts instead focus on identifying similar feature elements between different vendor CAD programs, however this approach relies on onerous manual identification requiring frequent revision.
This research develops methods to automate the task of mapping relationships between different data format representations. Two independent matching techniques identify similar CAD feature functions between heterogeneous programs. Text similarity and object geometry matching techniques are combined to match the data formats associated with CAD programs. An efficient search for matching function parameters is performed using a genetic algorithm that incorporates semantic data matching and geometry data matching. A greedy semantic matching algorithm is developed that compares with the Doc2vec short text matching technique over the API dataset tested. A SVD geometric surface registration technique is developed that requires fewer calculations than an equivalent Iterative Closest Point method
Monte Carlo Method with Heuristic Adjustment for Irregularly Shaped Food Product Volume Measurement
Volume measurement plays an important role in the production and processing of food products. Various methods have been
proposed to measure the volume of food products with irregular shapes based on 3D reconstruction. However, 3D reconstruction
comes with a high-priced computational cost. Furthermore, some of the volume measurement methods based on 3D reconstruction
have a low accuracy. Another method for measuring volume of objects uses Monte Carlo method. Monte Carlo method performs
volume measurements using random points. Monte Carlo method only requires information regarding whether random points
fall inside or outside an object and does not require a 3D reconstruction. This paper proposes volume measurement using a
computer vision system for irregularly shaped food products without 3D reconstruction based on Monte Carlo method with
heuristic adjustment. Five images of food product were captured using five cameras and processed to produce binary images.
Monte Carlo integration with heuristic adjustment was performed to measure the volume based on the information extracted from
binary images. The experimental results show that the proposed method provided high accuracy and precision compared to the
water displacement method. In addition, the proposed method is more accurate and faster than the space carving method
Modeling and Analyzing Collective Behavior Captured by Many-to-Many Networks
L'abstract è presente nell'allegato / the abstract is in the attachmen
Штучний інтелект
Funding: Research, preparation of materials and preparation of the textbook were carried out under the project – grant no. PPI/KAT/2019/1/00015/U/00001 "Cognitive technologies – second-cycle studies in English" and were carried under the KATAMARAN program Polish National Agency for Academic Exchange (NAWA).
The program is co-financed by the European Social Fund under the Knowledge Education Development Operational Program, a non-competition project entitled
"Supporting the institutional capacity of Polish universities through the creation and implementation of international study programs" implemented under Measure 3.3. Internationalization of Polish higher education, specified in the application for project funding no. POWR.03.03.00-00-PN 16/18.
The project was carried out in cooperation with the Silesian University of Technology (project leader – Poland) and the Kiev National University of Construction and
Architecture (project partner – Ukraine).Фінансування: Дослідження, підготовка матеріалів та підготовка підручника були здійснені в рамках проекту - грант №. PPI/KAT/2019/1/00015/U/00001 "Когнітивні технології-навчання другого циклу англійською мовою", які здійснювалися за програмою КАТАМАРАН Польське національне агентство академічного обміну (NAWA) .
Програма спільно фінансується Європейським соціальним фондом у рамках програми "Знання" Оперативна програма розвитку освіти, позаконкурентний проект під назвою "Підтримка інституційної спроможності польських університетів через створення та реалізація міжнародних навчальних програм ", що реалізуються відповідно до Заходу 3.3. Інтернаціоналізація польської вищої освіти, зазначена у заявці на фінансування проекту POWR.03.03.00-00-PN 16/18.
Проект здійснювався у співпраці з Сілезьким технологічним університетом (керівник проекту - Польща) та Київським національним університетом будівництва та архітектури (партнер проекту - Україна)
- …