Browse > Article
http://dx.doi.org/10.3745/JIPS.01.0009

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet  

Lee, Jeong Kyu (Dept. of Computer Science and Engineering, Seoul National University of Science and Technology)
Moon, Seo Yeon (Dept. of Computer Science and Engineering, Seoul National University of Science and Technology)
Park, Jong Hyuk (Dept. of Computer Science and Engineering, Seoul National University of Science and Technology)
Publication Information
Journal of Information Processing Systems / v.12, no.3, 2016 , pp. 489-501 More about this Journal
Abstract
As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new forms of" or "applying new forms of" or "studying various types of" or "finding ways to provide more" reliable communication to connect the Internet to various services is in demand. In this paper, we analyze the security threats caused by malicious activities in the future Internet and propose a human behavior analysis-based security service model for malware detection and intrusion prevention to provide more reliable communication. Our proposed service model provides high reliability services by responding to security threats by detecting various malware intrusions and protocol authentications based on human behavior.
Keywords
Future Internet; Human Behavior; Intrusion Prevention; Malware Detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Ata, D. Huang, X. Liu, A. Wada, T. Xing, P. Juluri, C. J. Chung, Y. Sato, and D. Medhi, "SeRViTR: a framework, implementation, and a testbed for a trustworthy future Internet," Computer Networks, vol. 63, pp. 128-146, 2014.   DOI
2 A. Ghezzi and M. Dramitinos, "Towards a Future Internet infrastructure: analyzing the multidimensional impacts of assured quality Internet interconnection," Telematics and Informatics, vol. 33, no. 2, pp. 613-630, 2016.   DOI
3 P. Jappinen, R. Guarneri, and L. M. Correia, "An applications perspective into the Future Internet," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 249-254, 2013.   DOI
4 K. C. Wang, M. Brinn, and J. Mambretti, "From federated software defined infrastructure to future Internet architecture," in Proceedings of International Science and Technology Conference Modern Networking Technologies (MoNeTeC), Moscow, Russia, 2014, pp. 1-6.
5 M. Berman, J. S. Chase, L. Landweber, A. Nakao, M. Ott, D. Raychaudhuri, R. Ricci, and I. Seskar, "GENI: a federated testbed for innovative network experiments," Computer Networks, vol. 61, pp. 5-23, 2014.   DOI
6 A. Hakiria, A. Gokhale, P. Berthou, D. C. Schmidt, and T. Gayraud "Software-defined networking: challenges and research opportunities for Future Internet," Computer Networks, vol. 75, pp. 453-471, 2014.   DOI
7 C. Granell, D. Havlik, S. Schade, Z. Sabeur, C. Delaney, J. Pielorz, et al., "Future Internet technologies for environmental applications," Environmental Modelling & Software, vol. 78, pp. 1-15, 2016.   DOI
8 The Global Environment for Network Innovations (GENI) [Online]. Available: http://groups.geni.net.
9 J. Kim and D. Kim, "A Future Internet testbed in Korea," in Proceedings of the 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing (WorldComp), Las Vegas, NV, 2011 [Online]. Available: http://weblidi.info.unlp.edu.ar/worldcomp2011-mirror/ICM.htm.
10 A. Lanna, F. Liberati, L. Zuccaro, and A. Di Giorgio, "Electric vehicles charging control based on Future Internet generic enablers," in Proceedings of 2014 IEEE International Electric Vehicle Conference (IEVC), Florence, Italy, 2014, pp. 1-5.
11 W. Tsai, C. F. Lai, and A. V. Vasilakos, "Future Internet of Things: open issues and challenges," Wireless Networks, vol. 20, no. 8, pp. 2201-2217, 2014.   DOI
12 Y. Park, D. S. Reeves, and M. Stamp, "Deriving common malware behavior through graph clustering," Computers & Security, vol. 39, pp. 419-430, 2013.   DOI
13 C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42-57, 2013.   DOI
14 L. Feng, X. Liao, Q. Han, and H. Li, "Dynamical analysis and control strategies on malware propagation model," Applied Mathematical Modelling, vol. 37, no. 16, pp. 8225-8236, 2013.   DOI
15 S. J. Hashim, A. R. Ramli, F. Hashim, K. Samsudin, R. Abdullah, A. R. Azmir, L. B. Osamah, I. A. Al-Baltah, and M. M. Al-Habshi, "SCARECROW: scalable malware reporting, detection and analysis," Journal of Convergence Information Technology, vol. 8, no. 14, pp. 1-12, 2013.
16 Y. Qiao, Y, Yabg, L. Ji, and J. He, "Analyzing malware by abstracting the frequent itemsets in API call sequences," in Proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 2013, pp. 265-270.
17 R. Islam, R. Tian, L. M. Batten, and S. Versteeg, "Classification of malware based on integrated static and dynamic features," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 646-656, 2013.   DOI
18 D. DeBarr, V. Ramanathan, and H. Wechsler, "Phishing detection using traffic behavior spectral clustering and random forests," in Proceedings of 2013 IEEE International Conference on Intelligence and Security Informatics (ISI), Seattle, WA, 2013, pp. 67-72.
19 B. Prelipcean, A. S. Popescu, and D. T. Gavrilut, "Improving malware detection response time with behaviorbased statistical analysis," in Proceedings of 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara, Romania, 2015, pp. 232-239.
20 G. Aloi, M. Di Felice, V. Loscri, P. Pace, and G. Ruggeri, "Spontaneous smartphone networks as a user-centric solution for the Future Internet," IEEE Communications Magazine, vol. 52, no. 12, pp. 26-33, 2014.   DOI
21 A. Mohaisen, O. Alrawi, and M. Mohaisen, "Amal: high-fidelity, behavior-based automated malware analysis and classification," Computer & Security, vol. 52, pp. 251-266, 2015.   DOI
22 G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, "Evolution, detection and analysis of malware for smart device," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 961-987, 2014.   DOI
23 P. Wang and Y. S. Wang, "Malware behavioural detection and vaccine development by using a support vector model classifier," Journal of Computer and System Sciences, vol. 81, no. 6, pp. 1012-1026, 2015.   DOI
24 P. Dewan, A. Kashyap, and P. Kumaraguru, "Analyzing social and stylometric features to identify spear phishing emails," in Proceedings of 2014 APWG Symposium on Electronic Crime Research (eCrime), Birmingham, AL, 2014, pp. 1-13.
25 N. Nissim, R. Moskovitch, L. Rokach, and Y. Elovici, "Novel active learning methods for enhanced PC malware detection in windows OS," Expert Systems with Applications, vol. 41, no. 13, pp. 5843-5857, 2014.   DOI
26 S. Alam, R. N. Horspool, I. Traore, and I. Sogukpinar, "A framework for metamorphic malware analysis and real-time detection," Computers & Security, vol. 48, pp. 212-233, 2015.   DOI