Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware

Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cognitive computation 2024-11, Vol.16 (6), p.3200-3227
Hauptverfasser: Jerbi, Manel, Chelly Dagdia, Zaineb, Bechikh, Slim, Said, Lamjed Ben
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3227
container_issue 6
container_start_page 3200
container_title Cognitive computation
container_volume 16
creator Jerbi, Manel
Chelly Dagdia, Zaineb
Bechikh, Slim
Said, Lamjed Ben
description Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.
doi_str_mv 10.1007/s12559-024-10337-6
format Article
fullrecord <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_04729097v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3125874939</sourcerecordid><originalsourceid>FETCH-LOGICAL-c234t-84648dcbeb642225aaefc81aa70bafd311cc620fa8ad9c765bd3087f047f2f283</originalsourceid><addsrcrecordid>eNp9kctu1DAYRiMEEqXwAqwssWJh8CVxYnZDWmilqbqgiKXl2L-nLmk82M6g8Da8KZ4GlR0r38732dapqteUvKOEtO8TZU0jMWE1poTzFosn1QnthMBSivrp47wRz6sXKd0RIhrZsJPqdx92k8_-AOOCLqe09xEsurmNAPibXtAZGJ98mNCV_u6nHdKTRR893kIJoPNDGOdcTnVc0PU--3v_Sx_XyIWIrsLgR0D9MkBMYObo8_LQrHMqvRnMEf2ANqjXCdCXPNsFlexmsjF4W24cf-oIL6tnTo8JXv0dT6uvn85v-gu8vf582W-22DBeZ9zVou6sGWAQNWOs0Rqc6ajWLRm0s5xSYwQjTnfaStOKZrCcdK0jdeuYYx0_rd6uvbd6VPvo78unVNBeXWy26rhXSCaJbA-0sG9Wdh_DjxlSVndhjlN5nuLFRNfWkstCsZUyMaQUwT3WUqKO2tSqTRVt6kGbEiXE11Aq8LSD-K_6P6k_2DOc7Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3125874939</pqid></control><display><type>article</type><title>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</title><source>Springer Nature - Complete Springer Journals</source><creator>Jerbi, Manel ; Chelly Dagdia, Zaineb ; Bechikh, Slim ; Said, Lamjed Ben</creator><creatorcontrib>Jerbi, Manel ; Chelly Dagdia, Zaineb ; Bechikh, Slim ; Said, Lamjed Ben</creatorcontrib><description>Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.</description><identifier>ISSN: 1866-9956</identifier><identifier>EISSN: 1866-9964</identifier><identifier>DOI: 10.1007/s12559-024-10337-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Applications programs ; Artificial Intelligence ; Automation ; Case studies ; Computation by Abstract Devices ; Computational Biology/Bioinformatics ; Computer Science ; Cybersecurity ; Decision making ; Evolution ; Fuzzy sets ; Genetic algorithms ; Malware ; Methods ; Optimization ; Process controls ; Set theory</subject><ispartof>Cognitive computation, 2024-11, Vol.16 (6), p.3200-3227</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c234t-84648dcbeb642225aaefc81aa70bafd311cc620fa8ad9c765bd3087f047f2f283</cites><orcidid>0000-0002-5070-5573 ; 0000-0002-2551-6586</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12559-024-10337-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12559-024-10337-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,314,776,780,881,27903,27904,41467,42536,51298</link.rule.ids><backlink>$$Uhttps://hal.science/hal-04729097$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Jerbi, Manel</creatorcontrib><creatorcontrib>Chelly Dagdia, Zaineb</creatorcontrib><creatorcontrib>Bechikh, Slim</creatorcontrib><creatorcontrib>Said, Lamjed Ben</creatorcontrib><title>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</title><title>Cognitive computation</title><addtitle>Cogn Comput</addtitle><description>Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.</description><subject>Applications programs</subject><subject>Artificial Intelligence</subject><subject>Automation</subject><subject>Case studies</subject><subject>Computation by Abstract Devices</subject><subject>Computational Biology/Bioinformatics</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Decision making</subject><subject>Evolution</subject><subject>Fuzzy sets</subject><subject>Genetic algorithms</subject><subject>Malware</subject><subject>Methods</subject><subject>Optimization</subject><subject>Process controls</subject><subject>Set theory</subject><issn>1866-9956</issn><issn>1866-9964</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kctu1DAYRiMEEqXwAqwssWJh8CVxYnZDWmilqbqgiKXl2L-nLmk82M6g8Da8KZ4GlR0r38732dapqteUvKOEtO8TZU0jMWE1poTzFosn1QnthMBSivrp47wRz6sXKd0RIhrZsJPqdx92k8_-AOOCLqe09xEsurmNAPibXtAZGJ98mNCV_u6nHdKTRR893kIJoPNDGOdcTnVc0PU--3v_Sx_XyIWIrsLgR0D9MkBMYObo8_LQrHMqvRnMEf2ANqjXCdCXPNsFlexmsjF4W24cf-oIL6tnTo8JXv0dT6uvn85v-gu8vf582W-22DBeZ9zVou6sGWAQNWOs0Rqc6ajWLRm0s5xSYwQjTnfaStOKZrCcdK0jdeuYYx0_rd6uvbd6VPvo78unVNBeXWy26rhXSCaJbA-0sG9Wdh_DjxlSVndhjlN5nuLFRNfWkstCsZUyMaQUwT3WUqKO2tSqTRVt6kGbEiXE11Aq8LSD-K_6P6k_2DOc7Q</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Jerbi, Manel</creator><creator>Chelly Dagdia, Zaineb</creator><creator>Bechikh, Slim</creator><creator>Said, Lamjed Ben</creator><general>Springer US</general><general>Springer Nature B.V</general><general>Springer</general><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-5070-5573</orcidid><orcidid>https://orcid.org/0000-0002-2551-6586</orcidid></search><sort><creationdate>20241101</creationdate><title>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</title><author>Jerbi, Manel ; Chelly Dagdia, Zaineb ; Bechikh, Slim ; Said, Lamjed Ben</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c234t-84648dcbeb642225aaefc81aa70bafd311cc620fa8ad9c765bd3087f047f2f283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Applications programs</topic><topic>Artificial Intelligence</topic><topic>Automation</topic><topic>Case studies</topic><topic>Computation by Abstract Devices</topic><topic>Computational Biology/Bioinformatics</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Decision making</topic><topic>Evolution</topic><topic>Fuzzy sets</topic><topic>Genetic algorithms</topic><topic>Malware</topic><topic>Methods</topic><topic>Optimization</topic><topic>Process controls</topic><topic>Set theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jerbi, Manel</creatorcontrib><creatorcontrib>Chelly Dagdia, Zaineb</creatorcontrib><creatorcontrib>Bechikh, Slim</creatorcontrib><creatorcontrib>Said, Lamjed Ben</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Cognitive computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jerbi, Manel</au><au>Chelly Dagdia, Zaineb</au><au>Bechikh, Slim</au><au>Said, Lamjed Ben</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware</atitle><jtitle>Cognitive computation</jtitle><stitle>Cogn Comput</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>16</volume><issue>6</issue><spage>3200</spage><epage>3227</epage><pages>3200-3227</pages><issn>1866-9956</issn><eissn>1866-9964</eissn><abstract>Malicious apps use a variety of methods to spread infections, take over computers and/or IoT devices, and steal sensitive data. Several detection techniques have been proposed to counter these attacks. Despite the promising results of recent malware detection strategies, particularly those addressing evolving threats, inefficiencies persist due to potential inconsistency in both the generated malicious malware and the pre-specified detection rules, as well as their crisp decision-making process. In this paper, we propose to address these issues by (i) considering the detection rules generation process as a Bi-Level Optimization Problem, where a competition between two levels (an upper level and a lower one) produces a set of effective detection rules capable of detecting new variants of existing and even unseen malware patterns. This bi-level strategy is subtly inspired by natural evolutionary processes, where organisms adapt and evolve through continuous interaction and competition within their environments. Furthermore, (ii) we leverage the fundamentals of Rough Set Theory, which reflects cognitive decision-making processes, to assess the true nature of artificially generated malicious patterns. This involves retaining only the consistent malicious patterns and detection rules and categorizing these rules into a three-way decision framework comprising accept, abstain, and reject options. Our novel malware detection technique outperforms several state-of-the-art methods on various Android malware datasets, accurately predicting new apps with a 96.76% accuracy rate. Moreover, our approach is versatile and effective in detecting patterns applicable to a variety of cybersecurity threats.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12559-024-10337-6</doi><tpages>28</tpages><orcidid>https://orcid.org/0000-0002-5070-5573</orcidid><orcidid>https://orcid.org/0000-0002-2551-6586</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1866-9956
ispartof Cognitive computation, 2024-11, Vol.16 (6), p.3200-3227
issn 1866-9956
1866-9964
language eng
recordid cdi_hal_primary_oai_HAL_hal_04729097v1
source Springer Nature - Complete Springer Journals
subjects Applications programs
Artificial Intelligence
Automation
Case studies
Computation by Abstract Devices
Computational Biology/Bioinformatics
Computer Science
Cybersecurity
Decision making
Evolution
Fuzzy sets
Genetic algorithms
Malware
Methods
Optimization
Process controls
Set theory
title Cognitively Inspired Three-Way Decision Making and Bi-Level Evolutionary Optimization for Mobile Cybersecurity Threats Detection: A Case Study on Android Malware
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T21%3A35%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cognitively%20Inspired%20Three-Way%20Decision%20Making%20and%20Bi-Level%20Evolutionary%20Optimization%20for%20Mobile%20Cybersecurity%20Threats%20Detection:%20A%20Case%20Study%20on%20Android%20Malware&rft.jtitle=Cognitive%20computation&rft.au=Jerbi,%20Manel&rft.date=2024-11-01&rft.volume=16&rft.issue=6&rft.spage=3200&rft.epage=3227&rft.pages=3200-3227&rft.issn=1866-9956&rft.eissn=1866-9964&rft_id=info:doi/10.1007/s12559-024-10337-6&rft_dat=%3Cproquest_hal_p%3E3125874939%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3125874939&rft_id=info:pmid/&rfr_iscdi=true