Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware
Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressin...
Gespeichert in:
Veröffentlicht in: | Cognitive computation 2024-11, Vol.16 (6), p.3200-3227 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3227 |
---|---|
container_issue | 6 |
container_start_page | 3200 |
container_title | Cognitive computation |
container_volume | 16 |
creator | Jerbi, Manel Chelly Dagdia, Zaineb Bechikh, Slim Said, Lamjed Ben |
description | Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats. |
doi_str_mv | 10.1007/s12559-024-10337-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_04729097v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3125874939</sourcerecordid><originalsourceid>FETCH-LOGICAL-c234t-84648dcbeb642225aaefc81aa70bafd311cc620fa8ad9c765bd3087f047f2f283</originalsourceid><addsrcrecordid>eNp9kctu1DAYRiMEEqXwAqwssWJh8CVxYnZDWmilqbqgiKXl2L-nLmk82M6g8Da8KZ4GlR0r38732dapqteUvKOEtO8TZU0jMWE1poTzFosn1QnthMBSivrp47wRz6sXKd0RIhrZsJPqdx92k8_-AOOCLqe09xEsurmNAPibXtAZGJ98mNCV_u6nHdKTRR893kIJoPNDGOdcTnVc0PU--3v_Sx_XyIWIrsLgR0D9MkBMYObo8_LQrHMqvRnMEf2ANqjXCdCXPNsFlexmsjF4W24cf-oIL6tnTo8JXv0dT6uvn85v-gu8vf582W-22DBeZ9zVou6sGWAQNWOs0Rqc6ajWLRm0s5xSYwQjTnfaStOKZrCcdK0jdeuYYx0_rd6uvbd6VPvo78unVNBeXWy26rhXSCaJbA-0sG9Wdh_DjxlSVndhjlN5nuLFRNfWkstCsZUyMaQUwT3WUqKO2tSqTRVt6kGbEiXE11Aq8LSD-K_6P6k_2DOc7Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3125874939</pqid></control><display><type>article</type><title>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</title><source>Springer Nature - Complete Springer Journals</source><creator>Jerbi, Manel ; Chelly Dagdia, Zaineb ; Bechikh, Slim ; Said, Lamjed Ben</creator><creatorcontrib>Jerbi, Manel ; Chelly Dagdia, Zaineb ; Bechikh, Slim ; Said, Lamjed Ben</creatorcontrib><description>Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.</description><identifier>ISSN: 1866-9956</identifier><identifier>EISSN: 1866-9964</identifier><identifier>DOI: 10.1007/s12559-024-10337-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Applications programs ; Artificial Intelligence ; Automation ; Case studies ; Computation by Abstract Devices ; Computational Biology/Bioinformatics ; Computer Science ; Cybersecurity ; Decision making ; Evolution ; Fuzzy sets ; Genetic algorithms ; Malware ; Methods ; Optimization ; Process controls ; Set theory</subject><ispartof>Cognitive computation, 2024-11, Vol.16 (6), p.3200-3227</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c234t-84648dcbeb642225aaefc81aa70bafd311cc620fa8ad9c765bd3087f047f2f283</cites><orcidid>0000-0002-5070-5573 ; 0000-0002-2551-6586</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12559-024-10337-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12559-024-10337-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,314,776,780,881,27903,27904,41467,42536,51298</link.rule.ids><backlink>$$Uhttps://hal.science/hal-04729097$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Jerbi, Manel</creatorcontrib><creatorcontrib>Chelly Dagdia, Zaineb</creatorcontrib><creatorcontrib>Bechikh, Slim</creatorcontrib><creatorcontrib>Said, Lamjed Ben</creatorcontrib><title>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</title><title>Cognitive computation</title><addtitle>Cogn Comput</addtitle><description>Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.</description><subject>Applications programs</subject><subject>Artificial Intelligence</subject><subject>Automation</subject><subject>Case studies</subject><subject>Computation by Abstract Devices</subject><subject>Computational Biology/Bioinformatics</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Decision making</subject><subject>Evolution</subject><subject>Fuzzy sets</subject><subject>Genetic algorithms</subject><subject>Malware</subject><subject>Methods</subject><subject>Optimization</subject><subject>Process controls</subject><subject>Set theory</subject><issn>1866-9956</issn><issn>1866-9964</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kctu1DAYRiMEEqXwAqwssWJh8CVxYnZDWmilqbqgiKXl2L-nLmk82M6g8Da8KZ4GlR0r38732dapqteUvKOEtO8TZU0jMWE1poTzFosn1QnthMBSivrp47wRz6sXKd0RIhrZsJPqdx92k8_-AOOCLqe09xEsurmNAPibXtAZGJ98mNCV_u6nHdKTRR893kIJoPNDGOdcTnVc0PU--3v_Sx_XyIWIrsLgR0D9MkBMYObo8_LQrHMqvRnMEf2ANqjXCdCXPNsFlexmsjF4W24cf-oIL6tnTo8JXv0dT6uvn85v-gu8vf582W-22DBeZ9zVou6sGWAQNWOs0Rqc6ajWLRm0s5xSYwQjTnfaStOKZrCcdK0jdeuYYx0_rd6uvbd6VPvo78unVNBeXWy26rhXSCaJbA-0sG9Wdh_DjxlSVndhjlN5nuLFRNfWkstCsZUyMaQUwT3WUqKO2tSqTRVt6kGbEiXE11Aq8LSD-K_6P6k_2DOc7Q</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Jerbi, Manel</creator><creator>Chelly Dagdia, Zaineb</creator><creator>Bechikh, Slim</creator><creator>Said, Lamjed Ben</creator><general>Springer US</general><general>Springer Nature B.V</general><general>Springer</general><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-5070-5573</orcidid><orcidid>https://orcid.org/0000-0002-2551-6586</orcidid></search><sort><creationdate>20241101</creationdate><title>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</title><author>Jerbi, Manel ; Chelly Dagdia, Zaineb ; Bechikh, Slim ; Said, Lamjed Ben</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c234t-84648dcbeb642225aaefc81aa70bafd311cc620fa8ad9c765bd3087f047f2f283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Applications programs</topic><topic>Artificial Intelligence</topic><topic>Automation</topic><topic>Case studies</topic><topic>Computation by Abstract Devices</topic><topic>Computational Biology/Bioinformatics</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Decision making</topic><topic>Evolution</topic><topic>Fuzzy sets</topic><topic>Genetic algorithms</topic><topic>Malware</topic><topic>Methods</topic><topic>Optimization</topic><topic>Process controls</topic><topic>Set theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jerbi, Manel</creatorcontrib><creatorcontrib>Chelly Dagdia, Zaineb</creatorcontrib><creatorcontrib>Bechikh, Slim</creatorcontrib><creatorcontrib>Said, Lamjed Ben</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Cognitive computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jerbi, Manel</au><au>Chelly Dagdia, Zaineb</au><au>Bechikh, Slim</au><au>Said, Lamjed Ben</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</atitle><jtitle>Cognitive computation</jtitle><stitle>Cogn Comput</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>16</volume><issue>6</issue><spage>3200</spage><epage>3227</epage><pages>3200-3227</pages><issn>1866-9956</issn><eissn>1866-9964</eissn><abstract>Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12559-024-10337-6</doi><tpages>28</tpages><orcidid>https://orcid.org/0000-0002-5070-5573</orcidid><orcidid>https://orcid.org/0000-0002-2551-6586</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1866-9956 |
ispartof | Cognitive computation, 2024-11, Vol.16 (6), p.3200-3227 |
issn | 1866-9956 1866-9964 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_04729097v1 |
source | Springer Nature - Complete Springer Journals |
subjects | Applications programs Artificial Intelligence Automation Case studies Computation by Abstract Devices Computational Biology/Bioinformatics Computer Science Cybersecurity Decision making Evolution Fuzzy sets Genetic algorithms Malware Methods Optimization Process controls Set theory |
title | Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T21%3A35%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cognitively%20Inspired%20Three-Way%20Decision%20Making%20and%20Bi-Level%20Evolutionary%20Optimization%20for%20Mobile%20Cybersecurity%20Threats%20Detection:%20A%20Case%20Study%20on%20Android%20Malware&rft.jtitle=Cognitive%20computation&rft.au=Jerbi,%20Manel&rft.date=2024-11-01&rft.volume=16&rft.issue=6&rft.spage=3200&rft.epage=3227&rft.pages=3200-3227&rft.issn=1866-9956&rft.eissn=1866-9964&rft_id=info:doi/10.1007/s12559-024-10337-6&rft_dat=%3Cproquest_hal_p%3E3125874939%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3125874939&rft_id=info:pmid/&rfr_iscdi=true |