Open Access iconOpen Access

ARTICLE

crossmark

Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model

by Ki-Pyoung Ma1, Dong-Ju Ryu2, Sang-Joon Lee3,*

1 Security Team, Doosan Corp., Seoul, 04563, Republic of Korea
2 Btress Corp., Hanam-Si, Gyeonggi-Do, 12902, Republic of Korea
3 School of Business Administration, Chonnam National University, Gwangju, 61186, Republic of Korea

* Corresponding Author: Sang-Joon Lee. Email: email

Computers, Materials & Continua 2024, 81(3), 4485-4502. https://doi.org/10.32604/cmc.2024.059116

Abstract

With the advancements in artificial intelligence (AI) technology, attackers are increasingly using sophisticated techniques, including ChatGPT. Endpoint Detection & Response (EDR) is a system that detects and responds to strange activities or security threats occurring on computers or endpoint devices within an organization. Unlike traditional antivirus software, EDR is more about responding to a threat after it has already occurred than blocking it. This study aims to overcome challenges in security control, such as increased log size, emerging security threats, and technical demands faced by control staff. Previous studies have focused on AI detection models, emphasizing detection rates and model performance. However, the underlying reasons behind the detection results were often insufficiently understood, leading to varying outcomes based on the learning model. Additionally, the presence of both structured or unstructured logs, the growth in new security threats, and increasing technical disparities among control staff members pose further challenges for effective security control. This study proposed to improve the problems of the existing EDR system and overcome the limitations of security control. This study analyzed data during the preprocessing stage to identify potential threat factors that influence the detection process and its outcomes. Additionally, eleven commonly-used machine learning (ML) models for malware detection in XAI were tested, with the five models showing the highest performance selected for further analysis. Explainable AI (XAI) techniques are employed to assess the impact of preprocessing on the learning process outcomes. To ensure objectivity and versatility in the analysis, five widely recognized datasets were used. Additionally, eleven commonly-used machine learning models for malware detection in XAI were tested with the five models showing the highest performance selected for further analysis. The results indicate that eXtreme Gradient Boosting (XGBoost) model outperformed others. Moreover, the study conducts an in-depth analysis of the preprocessing phase, tracing backward from the detection result to infer potential threats and classify the primary variables influencing the model’s prediction. This analysis includes the application of SHapley Additive exPlanations (SHAP), an XAI result, which provides insight into the influence of specific features on detection outcomes, and suggests potential breaches by identifying common parameters in malware through file backtracking and providing weights. This study also proposed a counter-detection analysis process to overcome the limitations of existing Deep Learning outcomes, understand the decision-making process of AI, and enhance reliability. These contributions are expected to significantly enhance EDR systems and address existing limitations in security control.

Keywords


Cite This Article

APA Style
Ma, K., Ryu, D., Lee, S. (2024). Reverse analysis method and process for improving malware detection based on XAI model. Computers, Materials & Continua, 81(3), 4485–4502. https://doi.org/10.32604/cmc.2024.059116
Vancouver Style
Ma K, Ryu D, Lee S. Reverse analysis method and process for improving malware detection based on XAI model. Comput Mater Contin. 2024;81(3):4485–4502. https://doi.org/10.32604/cmc.2024.059116
IEEE Style
K. Ma, D. Ryu, and S. Lee, “Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model,” Comput. Mater. Contin., vol. 81, no. 3, pp. 4485–4502, 2024. https://doi.org/10.32604/cmc.2024.059116



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 449

    View

  • 188

    Download

  • 0

    Like

Share Link