Using Knowledge Graphs and Reinforcement Learning for Malware Analysis

dc.contributor.authorPiplai, Aritran
dc.contributor.authorRanade, Priyanka
dc.contributor.authorKotal, Anantaa
dc.contributor.authorMittal, Sudip
dc.contributor.authorNarayanan, Sandeep Nair
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2020-12-10T19:31:01Z
dc.date.available2020-12-10T19:31:01Z
dc.descriptionIEEE International Conference on Big Data 2020
dc.description.abstractMachine learning algorithms used to detect attacks are limited by the fact that they cannot incorporate the background knowledge that an analyst has. This limits their suitability in detecting new attacks. Reinforcement learning is different from traditional machine learning algorithms used in the cybersecurity domain. Compared to traditional ML algorithms, reinforcement learning does not need a mapping of the input-output space or a specific user-defined metric to compare data points. This is important for the cybersecurity domain, especially for malware detection and mitigation, as not all problems have a single, known, correct answer. Often, security researchers have to resort to guided trial and error to understand the presence of a malware and mitigate it. In this paper, we incorporate prior knowledge, represented as Cybersecurity Knowledge Graphs (CKGs), to guide the exploration of an RL algorithm to detect malware. CKGs capture semantic relationships between cyber-entities, including that mined from open source. Instead of trying out random guesses and observing the change in the environment, we aim to take the help of verified knowledge about cyber-attack to guide our reinforcement learning algorithm to effectively identify ways to detect the presence of malicious filenames so that they can be deleted to mitigate a cyber-attack. We show that such a guided system outperforms a base RL system in detecting malware.en_US
dc.description.sponsorshipThe authors would like to thank Dr. Mahmoud Abdelsalam and Dr. Maanak Gupta for the dataset used in this work. This work was supported by a United States Department of Defense grant, a gift from IBM research, and a National Science Foundation (NSF) grant, award number 2025685.en_US
dc.description.urihttps://ebiquity.umbc.edu/paper/html/id/960/Using-Knowledge-Graphs-and-Reinforcement-Learning-for-Malware-Analysisen_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/m2fgcw-n1ui
dc.identifier.citationAritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, and Anupam Joshi, Using Knowledge Graphs and Reinforcement Learning for Malware Analysis; IEEE International Conference on Big Data 2020en_US
dc.identifier.urihttp://hdl.handle.net/11603/20231
dc.language.isoen_USen_US
dc.publisherIEEE
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2020 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.subjectreinforcement learningen_US
dc.subjectknowledge graphsen_US
dc.subjectcybersecurityen_US
dc.subjectartificial intelligenceen_US
dc.subjectUMBC Ebiquity Research Group
dc.titleUsing Knowledge Graphs and Reinforcement Learning for Malware Analysisen_US
dc.typeTexten_US

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: