N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents

Authors

DOI:

https://doi.org/10.9781/ijimai.2017.03.013

Keywords:

Classification, Feature Extraction, Malicious Mobile Agents

Abstract

From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for techniques for automated malicious agent detection. In this context, the machine learning (ML) methods are acknowledged more effective than the Signature-based and Behavior-based detection methods. Therefore, in this paper, the prime contribution has been made to detect the unknown malicious mobile agents based on n-gram features and supervised ML approach, which has not been done so far in the sphere of the Mobile Agents System (MAS) security. To carry out the study, the n-grams ranging from 3 to 9 are extracted from a dataset containing 40 malicious and 40 non-malicious mobile agents. Subsequently, the classification is performed using different classifiers. A nested 5-fold cross validation scheme is employed in order to avoid the biasing in the selection of optimal parameters of classifier. The observations of extensive experiments demonstrate that the work done in this paper is suitable for the task of unknown malicious mobile agent detection in a Mobile Agent Environment, and also adds the ML in the interest list of researchers dealing with MAS security.

Downloads

Download data is not yet available.

References

A. Aneiba, and S.J. Rees, “Mobile Agents Technology and Mobility”, in Proceedings of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 2004. pp. 14-20.

D.B. Lange, and M. Oshima, “Seven good reasons for Mobile Agents”, Communications of the ACM, vol. 42, no. 3, pp. 88-89, 1999.

L.L. Thomsen, and B. Thomsen, “Mobile Agents – The new paradigm in computing”, ICL- The Systems Journal, vol. 12, pp. 14-40, 1997.

R. Oppliger, “Security issues related to mobile code and agent-based systems”, Computer Communications, vol. 22, no. 12, pp. 1165-1170, 1999.

D. Venugopal, and G. Hu, “Efficient signature based malware detection on mobile devices”, Mobile Information Systems, vol. 4, no. 1, pp. 33-49, 2008.

W. Ma, P. Duan, S. Liu, G. Gu, J. Liu, “Shadow attacks: automatically evading system-call-behavior based malware detection”, Journal in Computer Virology, vol. 8, no. 1, pp. 1-13, 2012.

R. Moskovitch, C. Feher, N. Tzachar, E. Berger, M. Gitelman, D. Shlomi, and Y. Elovici, “Unknown Malcode Detection Using OPCODE Representation”, Intelligence and Security Informatics, vol. 5376, pp. 204-15, 2008.

A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer, “Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey”, Information Security Technical Report, vol. 14, no. 1, pp. 16-29, 2009.

J.Z. Kotler, and M.A. Maloof, “Learning to detect malicious executables in the wild”, in Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 22, New York, ACM Press, pp. 470-478, 2004.

S. Jain, and Y.K. Meena, “Byte Level n-Gram Analysis for Malware Detection”, in Proceedings of the 5th International Conference on Information Processing, ICIP 2011, Aug 5-7, Banglore, India, Springer Berlin Heidelberg, pp. 51-59, 2011.

R. Wahbe, S. Lucco, T.E. Anderson, and S.L. Graham, “Efficient SoftwareBased Fault Isolation”, in Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, SOSP ’93, Dec 5-8, Asheville, North Carolina, USA, ACM Press, pp. 203-216, 1993.

G. Noordende, F. M. Brazier, and A.S. Tannenbaum, “A security framework for a mobile agent system”, in Proceedings of the 2nd International Workshop on Security in Mobile Multiagent Systems, SEMAS 2002, Bologna, Italy, pp. 43-50, 2002.

P. Marikkannu, and A. Jovin, “A Secure Mobile Agent System against Tailgating Attacks”, Journal of Computer Science, vol. 7, no. 4, pp. 488-492, 2011.

M. Alfalayeh, and L. Brankovic L, “An overview of security issues and techniques in mobile agents”, in Proceedings of the 8th IFIP TC-6 TC11 Conference on Communications and Multimedia Security, pp. 59-78, 2005.

P. Lee, and G. Necula, “Research on proof-carrying code for mobile-code security”, in DARPA workshop on foundations for secure mobile code, pp. 26-28, 1997.

J.J. Ordille, “When agents roam, who can you trust?”, in Proceedings of the IEEE First Annual conference on Emerging Technologies and Applications in Communications, pp. 188-191, 1996.

C. Cao, and J. Lu, “Path-history-based access control for mobile agents,” International Journal of Parallel, Emergent and Distributed Systems, vol. 21, no. 3, pp. 215-225, 2006.

S. Venkatesan, and S. Chellappan, “Protection of mobile agent platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)”, in Proceedings of the IEEE First International Conference on Emerging Trends in Engineering and Technology (ICETET ’08), IEEE, pp. 1228-1231, 2008.

S. Venkatesan, C. Chellappan, T. Vengattaraman, P. Dhavachelvan, and Vaish, “Advanced mobile agent security models for code integrity and malicious availability check”, Journal of Network and Computer Applications, vol. 33, no. 6, pp. 661-671, 2010.

S. Venkatesan, R. Baskaran, C. Chellappan, A. Vaish, and P. Dhavachelvan, “Artificial immune system based mobile agent platform protection,” Computer Standards & Interfaces, vol. 35, no. 4, pp. 365-373, 2013.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reuteman, and I.H. Witten, “The WEKA data mining software: an update”, ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10-18, 2009.

J. Han, “Data mining: concepts and Techniques”, 2000.

D. Gavriluţ, M. Cimpeşu, D. Anton, and L. Ciortuz, “Malware Detection Using Machine Learning”, in Proceedings of the International Multiconference on Computer Science and Information Technology, Oct 12, IEEE, pp. 735-741, 2009.

T. Abou-Assaleh, N. Cercone, V. Kešelj, and R. Sweidan, “N-gram-based detection of new malicious code”, in Proceedings of the IEEE 28th Annual International Conference on Computer Software and Applications, pp. 41-42, 2004.

I. Santos, Y.K. Penya, J. Devesa, and P.G. Bringas. “N-grams-based File Signatures for Malware Detection”, in Proceedings of the 2009 International Conference on Enterprise Information Systems, pp. 317-320, 2009.

M. Sokolova, and G. Lapalme, “A systematic analysis of performance measures for classification tasks”, Information Processing & Management, vol. 45, no. 4, pp. 427-437, 2009.

R. Burbidge, B. Buxton, “An Introduction to Support Vector Machines for Data Mining”, Keynote Speakers, young OR12, pp. 3-15, 2001.

V. Jakkula, “Tutorial on Support Vector Machine (SVM)”, School of EECS, Washington State University, 2006.

C.W. Hsu, C.C. Chang, C.J. Lin, “A Practical Guide to Support Vector Classification”, Technical Report, Department of computer Science, National Taiwan University, 2003.

C.Y. Suen, “n-Gram Statistics for Natural Language Understanding and Text Processing”, IEEE Transactions on Pattern Analysis, vol. PAMI-1, no. 2, pp.164-172, 1979.

T.T. Nguyen, H.V. Pham, P.M. Vu, and T. T. Nguyen, “Learning API Usages from Bytecode: A Statistical Approach”, in Proceedings of the 38th International Conference on Software Engineering (ICSE ‘16), May 14-22, Austin, Texas, ACM Press, pp. 416-427, 2016.

Y. Qiao, Y. Yang, J. He, C. Tang, and Z. Liu, “CBM: Free, Automatic Malware Analysis Framework Using API Call Sequences”, in Proceedings of the Seventh International Conference on Intelligent Systems and Knowledge Engineering, Dec 2012, Beijing, China, Springer Berlin Heidelberg, pp. 225-236.

S. Varma, and R. Simon, “Bias in error estimation when using cross validation for model selection”, BMC Informatics, vol. 7, no. 1, 2006.

H. Idrissi, E. M. Souidi, and A. Revel, “Security of mobile agent platforms using access control and cryptography”, in Proceedings of the 9th KES international conference (KES-AMSTA), pp. 27–39, 2015.

H. Idrissi, A. Revel, and E. M. Souidi, “Security of Mobile Agent Platforms using RBAC based on Dynamic Role Assignment”, International Journal of Security and Its Applications, vol. 10, no. 4, pp.117-134, 2016.

M. Malathy, S.J. Smilee, J. N. Samuel, “Secure Mobile Agent in M-Commerce over Internet”, in Proceedings of International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 1-5, 2016.

Downloads

Published

2017-12-01
Metrics
Views/Downloads
  • Abstract
    30
  • PDF
    24

How to Cite

Bagga, P., Hans, R., and Sharma, V. (2017). N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents. International Journal of Interactive Multimedia and Artificial Intelligence, 4(6), 33–39. https://doi.org/10.9781/ijimai.2017.03.013