2020 IEEE International Conference on Big Data (Big Data) 2020
DOI: 10.1109/bigdata50022.2020.9378491
|View full text |Cite
|
Sign up to set email alerts
|

Using Knowledge Graphs and Reinforcement Learning for Malware Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

5
5

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…Unsupervised methods, using deep learning models have also been useful in detecting cyber-threats involving network data [36,42]. Reinforcement Learning-based methods are also becoming popular in detecting cyber-threats and malware [33,35,44]. Some researchers have shown that Random Forests outperform other state-of-the-art algorithms for Network IDS tasks [5].…”
Section: Related Workmentioning
confidence: 99%
“…Unsupervised methods, using deep learning models have also been useful in detecting cyber-threats involving network data [36,42]. Reinforcement Learning-based methods are also becoming popular in detecting cyber-threats and malware [33,35,44]. Some researchers have shown that Random Forests outperform other state-of-the-art algorithms for Network IDS tasks [5].…”
Section: Related Workmentioning
confidence: 99%
“…Knowledge graphs can be refined to contain knowledge about a specific domain. In our prior work, we used Cybersecurity Knowledge Graphs (CKGs) to represent Cyber Threat Intelligence (CTI) ( Piplai et al, 2020a ; Piplai et al, 2020b ; Piplai et al, 2020c ). To build a Knowledge Graph specific to a domain, we need to define the ontology schema and entity relations in the domain.…”
Section: Related Workmentioning
confidence: 99%
“…Piplai et al [32], [39] create a pipeline to extract information from malware after action reports and other unstructured CTI sources and represent that in a CKG. They use this prior knowledge stored in a CKG as input to agents in a reinforcement learning environment [40]. We demonstrate the effects of the poisoning attack, by ingesting fake CTI on CKG using a complete CTI processing pipeline [31], [32].…”
Section: Ai-based Cyber Systems and Knowledge Graphsmentioning
confidence: 99%