Next Article in Journal
Incorporating Time-Series Forecasting Techniques to Predict Logistics Companies’ Staffing Needs and Order Volume
Previous Article in Journal
Incremental Learning-Based Algorithm for Anomaly Detection Using Computed Tomography Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Algebraic Structures Induced by the Insertion and Detection of Malware

by
Agustín Moreno Cañadas
1,*,
Odette M. Mendez
2 and
Juan David Camacho Vega
1
1
Departamento de Matemáticas, Universidad Nacional de Colombia, Edificio Yu Takeuchi 404, Kra 30 No. 45-03, Bogotá 11001000, Colombia
2
Departamento de Matemáticas, Universidad Nacional de Colombia, La Nubia, Manizales 170003, Colombia
*
Author to whom correspondence should be addressed.
Computation 2023, 11(7), 140; https://doi.org/10.3390/computation11070140
Submission received: 7 June 2023 / Revised: 7 July 2023 / Accepted: 7 July 2023 / Published: 11 July 2023

Abstract

:
Since its introduction, researching malware has had two main goals. On the one hand, malware writers have been focused on developing software that can cause more damage to a targeted host for as long as possible. On the other hand, malware analysts have as one of their main purposes the development of tools such as malware detection systems (MDS) or network intrusion detection systems (NIDS) to prevent and detect possible threats to the informatic systems. Obfuscation techniques, such as the encryption of the virus’s code lines, have been developed to avoid their detection. In contrast, shallow machine learning and deep learning algorithms have recently been introduced to detect them. This paper is devoted to some theoretical implications derived from these investigations. We prove that hidden algebraic structures as equipped posets and their categories of representations are behind the research of some infections. Properties of these categories are given to provide a better understanding of different infection techniques.

1. Introduction

Nowadays, the daily life of human being is significantly affected by computers and informatic systems, making cybersecurity one of the main concerns to be addressed by government agencies and companies to protect users from diverse threats arising from Internet use. Such threats are mainly provoked by malware, i.e., a malicious software designed to perform some unauthorized, often harmful or undesirable acts. Computer viruses, trojan horses, worms, and ransomware are examples of malware [1,2,3,4].
According to Cohen [5], who is considered the pioneer researcher in computer viruses, a virus is a program that is able to infect other programs by modifying them to include a possibly evolved copy of itself. Cohen wrote the first program of this type which is currently known as the Stoned boot virus. Another example of a computer virus is Stuxnet [6] considered the first cyber-warfare weapon ever.
Perhaps the simplest kind of malware is a Trojan horse which tries to appeal to and interest the user with some useful functionality to entice the user to run the program. In particular, they have been used to steal passwords. Rootkits, AIDS TROJAN DISK, Qbot (malware specialized in stealing user data) and TrickBot (malware focused on stealing financial data) are examples of Trojan horses.
Worms are also examples of malware. They are network viruses, primarily replicating on networks. Usually, these programs execute themselves automatically on a remote machine with minimal user intervention. Particularly, worms do not require a host program. SQL Slammer, Melissa (which is a macrovirus), Morris, as well as Netbus, Subseven, Deep Throat, Back Orifice and Concept, are some of the most known worms [1].
Ransomware is a kind of malware which encrypts data on a computer to prevent users from accessing their computer files or systems. Cybercriminals hold the data until a ransom is paid. It is worth pointing out that the FBI has observed that one of the most frequent attacks carried out over the last few years by cybercriminals is realized via some ransomware. Wannacry, LockBit, Cryptolocker, Sodinokibi/REvil, and Phobos are examples of this type of attack. According to Ploszek et al. [7], crypto Ransomware is the most dangerous among the different Ransomware attacks. These attacks allow the encryption of images, videos and any valuable user files.
At the beginning of the antivirus industry, malware detection was based on heuristic features that identified particular malware by creating a reliable fingerprint. During the detection, an antiviral engine checked the presence of the malware fingerprint in a file against known malware fingerprints stored in the antivirus database. String Scanning, Wildcards and Mismatches are examples of the first virus detection programs. Wildcards were used to detect the metamorphic virus w32/Regswap. These techniques allowed finding the sequence 83EB 0274 1683 EBOE 74OA 81EB 0301 0000 which identifies the w32/Beast virus [1].
Fingerprints associated with infected files were sensitive to small changes in files. Furthermore, malware writers invented metamorphic and polymorphic viruses, which give rise to hundreds of thousands of new virus versions, making the previous detection approaches ineffective. In this line, malware detection systems have been developed based on traditional machine learning (support vector machines, decision trees, naive Bayes classifier, etc.) and deep learning algorithms based on recurrent neural networks (RNNs) [8,9].
It is worth pointing out that several authors need to be more convinced of the RNN’s effectiveness for intrusion detection due to their vulnerability against adversarial attacks. These authors have preferred the use of images and to train convolutional neural networks to learn feature malware [10,11,12]. Another advancement in dealing with the use of machine learning in NIDS was proposed by Iglesias and Criado [13], who used time series, visibility graphs and multiplex networks to analyze the behavior of attackers’ computers. They pointed out that tools such as Snort used to analyze network traffic and protocol have disadvantages (e.g., no zero-day attacks detection [14]) to network intrusion detection.
Kaspersky [15] developed detection malware tools based on machine learning techniques. In such a case, hash functions, and unsupervised learning confluent to extract file features that can be computed quickly and directly retrieved from the structure of the executable, like a file format description. Authors refer to [16,17] for good surveys regarding recent trends of the deep learning use for malware detection, in particular, for descriptions of cloud-based malware detection, mobile-device-based malware detection, and IoT-based malware detection.

1.1. Motivations

Currently, there needs to be more malware investigations dealing with its relation to the theory of representation of algebras. A comprehensive algebraic study of malware insertion detection will give rise to a better understanding of different cyber-attacks; works in this direction have been proposed by Webster [18]. This paper proves that attacks of type Linux/Slapper or Scalper and some other metamorphic attacks in confluence with detection techniques as those presented by Kaspersky based on machine learning methods give rise to categories of representations of partially ordered sets. In particular, obfuscation techniques associated with metamorphic attacks define categorical equivalences between these categories.

1.2. Contributions

The main results of this paper are Theorems 2–4, and Corollary 1. Theorems 2 and 3 prove that some malware insertion-detection algorithms associated with some hierarchical attacks define particular families of partially ordered sets (posets).
Corollary 1 proves that posets introduced in Theorem 3 define hierarchical attacks without hidden malware.
Theorem 4 proves that malware insertion-detection algorithms give rise to categorical equivalences between categories of representations of posets.
This paper is structured as follows; Main definitions and notation are given in Section 2, we present an overview of definitions and notation regarding malware (Section 2.1) and posets (Section 2.2). We present the main results in Section 3. Section 4 gives an example of the results obtained in Section 3. Concluding remarks are given in Section 5.

2. Preliminaries

This section is devoted to revising basic definitions and notation regarding malware insertion and detection, as well as, partially ordered sets and their F -linear representations [1,2,3,4,19,20,21,22].

2.1. Malware

As explained in the introduction, malware is malicious software designed to perform some unauthorized, often harmful or undesirable acts [1]. The development of malware research has encouraged the introduction of sophisticated infection-detection malware techniques. Recently discovered computer viruses and worms such as Stuxnet [6] and its variations are examples of the research progress on the subject.

2.1.1. Computer Viruses

The typical structure of a computer virus consists of the following three subroutines [1]:
  • Infect-executable. This routine finds available executable files to infect them by copying its code.
  • Do-damage or Payload. This is responsible for delivering the malicious part of the virus.
  • Trigger-Pulled. Determines whether all the conditions required to deliver the payload are satisfied.
In the earlier stages of the antivirus industry, malware detection on computers had as a main goal to create a reliable fingerprint of a malicious file via its heuristic features. For instance,
  • Code fragments.
  • Hashes of code fragments or the whole file.
  • File properties.
  • Combinations of these features.
The obtained fingerprint is compared with those stored in an antivirus database. However, malware writers introduced new versions of code virus for which the fingerprint approach is inefficient. Currently, computer viruses include decryptors to hide their functionality, encryption keys can be generated in different ways, such as constant, random but fixed, sliding, and shifting, often the encryption is carried out by applying an xor operation (e.g., W95/Memorial virus). However, other encryption techniques dealing with symmetry key cryptography (e.g., the IDEA family of viruses) and public-key cryptography have been used to encrypt viruses. Polymorphic and metamorphic computer viruses are examples of the use of decryptors.
Polymorphic viruses can mutate their decryptors to a high number of different instances that can take millions of different forms. The 1260 virus is an example of a polymorphic virus, it includes two sliding keys to decrypt its body and some junk instructions, which are nothing but garbage in the code [1].
Metamorphic viruses create new virus generations that look different. They have one single-code body that carries data as code.
Formally speaking a metamorphic virus can be defined as follows [4]:
Let Ψ P ( d , p ) be a function computed by a computer program P. Then a pair v and v of recursive functions are said to be a metamorphic virus if it satisfies the following identities:
Ψ v ( δ ) ( d , p ) = D ( d , p ) , if T ( d , p ) , Ψ δ ( d , p ( v ( S ( p ) ) ) ) , if I ( d , p ) , Ψ δ ( d , p ) otherwise .
and
Ψ v ( δ ) ( d , p ) = D ( d , p ) , if T ( d , p ) , Ψ δ ( d , p ( v ( S ( p ) ) ) ) , if I ( d , p ) , Ψ δ ( d , p ) otherwise .
where ( d , p ) is a running environment consisting of data d and programs p stored on computers. D ( d , p ) , D ( d , p ) , and S ( p ) are recursive functions. Whereas, T ( d , p ) is called the injury condition and I ( d , p ) , I ( d , p ) are called infection conditions.
The difference between polymorphic and metamorphic viruses is that each form of a polymorphic virus has the same kernel and forms associated with metamorphic viruses have their own kernel.
As an example, the following are two generations of the metamorphic virus W95/Regswap:
1.
5A                pop   edx                        58                   pop, eax
2.
BF04000000      mov   edi, 0004h               BB04000000      mov   ebx, 0004h             
3.
8BF5            mov  esi, ebp                    8BD5              mov  edx, ebp
4.
B80C000000     mov   eax, 000Ch            BF0C000000     mov   edi, 000Ch
5.
81C288000000  mov   add, edx, 0088h      81C088000000   mov   add, eax, 0088h
6.
8B1A            mov  ebx, [edx]                8B30                 mov  esi, [eax]
7.
899C8618110000   mov   [ δ ]                      89B4BA18110000   mov  [ δ ]
8.
δ = esi+eax*4+00001118, ebx       δ = edx+edi*4+00001118, esi.
Figure 1 shows examples of different generations produced by metamorphic viruses.
Konstantinou [4] implemented a Hidden Markov Method to detect metamorphic attacks. He implemented (via a virus construction kit) code obfuscation techniques, like instruction reordering and garbage insertion, to produce the metamorphic versions of a virus. We remind the readers that, instruction substitution, instruction permutation, garbage code, variable substitution, and altering control flow are examples of obfuscation techniques. They have been used by viruses and worms as Evol (2000), Zmist, Zperm, Regswap, and Methaphor [1,2,3,4].
Some computer worms like Linux/Scalper develop so-called hierarchical attacks to control remote networks. In such a case, each infected node receives crucial information, such as the IP address of the adversary host and the addresses of the infected nodes. This type of information is provided to the remaining nodes until all target network nodes are infected.
Classical approaches to detect malware based on its fingerprint became ineffective due to its vulnerability to zero-day attacks. Recently, Kaspersky [15] implemented machine learning methods to detect packed routines. Their method consists of analyzing file features resistant to small changes. According to this approach, the machine learns suitable hash values h ( x ) associated with scanned files, and a similarity function is defined to determine whether or not two of these files are similar.
Similar files constitute a so-called hash bucket. These hash buckets classify the scanned files into two regions, named simple regions or hard regions. Files in simple regions of a hash bucket are either pure benign or pure malware, and no further feature analysis is required. Similarity pairs in these regions are of the form ( h ( x 1 ) , 0 ) or ( 0 , h ( x 2 ) ) . In hard regions of a hash bucket, the files can be benign and malware, and deep feature analysis is developed for more precise detection. Similarity pairs in hard regions are of the form ( h ( x 1 ) , h ( x 2 ) ) .
Suppose the infection builds a hierarchical network, as in the case of a scalper attack. Each node contains benign and malware files in simple and hard regions. If vectors consisting of bits are used to denote such files, then a fixed node N i has a structure c ( N i ) of the form.
c ( N i ) = S i H i , 1 i s i , f r s , g l n , h l n { 0 , 1 } . S i = { f 1 i , f 2 i , , f m i } . H i = { ( g l 1 ( ( t i + j ) ) , h l 1 ( ( t i + j ) ) ) , ( g l 1 + 1 ( ( t i + j ) ) , h l 1 + 1 ( ( t i + j ) ) ) , , ( g l 1 + r i ( ( t i + j ) ) , h l 1 + r i ( ( t i + j ) ) ) } , H i , 1 = { g l 1 ( ( t i + j ) ) , g l 1 + 1 ( ( t i + j ) , , g l 1 + r i ( ( t i + j ) ) } , H i , 2 = { h l 1 ( ( t i + j ) ) ) , h l 1 + 1 ( ( t i + j ) ) ) , , h l 1 + r i ( ( t i + j ) ) ) } .
where S i ( H i ) denote the set of simple (hard) files contained in N i . It is assumed that all the files have the same size.
Figure 2 shows the entries of the matrix c ( N i ) = S i 0 0 H i , 1 0 i H i , 2 of the node N i , where S i , H i , 1 and H i , 2 are matrix blocks of suitable size associated with files S i and H i (see identities (1)). In this case, we add as many zeroes as possible to satisfy restrictions related to the inclusion of garbage instructions and size of the files. We also assume the notation g + i h for each pair of the form ( g , h ) .
Obfuscation techniques as xor and row and column permutations can be applied to the elements of the node c ( N i ) to obtain new versions of the detected viruses.
A node N i in a hierarchical attack is said to be strong (weak) if its files belong to a simple (hard) region. Files in a strong node are either of pure benign type or pure malware type. We let ⊙ (⊖) denote a strong ( w e a k ) node in a hierarchical attack.
Henceforth, we will assume that nodes associated with a hierarchical attack have the structure given by the matrix shown in Figure 2.

2.1.2. Using Information Theory to Detect and Insert Malware

As we have seen in previous sections, polymorphisms make infeasible static detection of viruses. We remind the reader that there are two kinds of polymorphisms (those obtained by data encryption and those obtained by data compressing). Machine learning methods have been developed to detect different file features such as N-grams, statistical features, and entropy. Particularly, entropy features are based on the entropy computation of the file or some of its areas. Bearing in mind that benign files tend to have low entropy values, whereas obfuscated or packed files tend to have high entropy values [23].
Lyda and Hamrock [24] introduced the idea of using entropy (over the entire file) to classify packed malware. It is worth noting that nowadays, distinguishing between packed and non-packed executable files is a strong line of investigation for malware analysts. For instance, Mantovani et al. [23] implemented a machine-learning classifier based on the union of features to identify different forms of packing. Lee et al. [25] used machine learning to recover original files from backup system files (infected with ransomware) via entropy techniques. Perdisci et al. [26] proposed studying specific packer features in the portable executable file format. Whereas, Ugarte-Pedrero et al. [27] suggested that entropy is the main feature of detecting packed files. They used the Zeus botnet, one of the first bot families to adopt low entropy packing schemes.
Raphel et al. [28] used entropy to recognize polymorphic samples which use xor-based encoders. Their approach is based on five steps (extraction of files or appropriated file fragments, computation and concatenation of such fragments, computation of the entropy for concatenated fragments and construction of a suitable similarity distance matrix).
We also recall that Lim et al. [29] proposed to analyze the different files as vectors or streams of bytes to analyze some statistical features.
Entropy has also been used as a helpful feature to insert malicious files. In such a case, the analyst splits a target file into shares or chunks to insert a low entropy pattern of bytes between each share; then, the malicious file is reconstructed in memory to bypass the action of high entropy file detectors. Menéndez et al. [30,31] used the entropy-based tools EnTS and EEE to detect and conceal malicious files into executables. They also used VirusTotal to reproduce the behavior of some anti-virus engines. Detect It Easy (DIE), PEiD, PackerID, NFD, ExeScan, and Manalyze are popular tools to analyze malware. In particular, DIE and PEiD have a component for entropy analysis [23,32].
Nowadays, an interesting problem in cryptography is proving the leakage resilience of cryptographic implementations. Side-channel attacks (SCA) may be one of these implementations’ most significant threats [33]. In this kind of attack, a secret key implemented in a device (e.g., a smart card) is retrieved by analyzing the side channel signals obtained from its physical implementation. Low entropy masking schemes (LEMS) have been introduced to guarantee high security against SCA attacks with less randomness than traditional masking schemes. Analysis of these types of schemes has been implemented by Li et al. [34], who studied leakage characteristics of multiplicative LEMS. Whereas Zhang et al. [35] trained deep learning assisted with a new metric to improve SCA attacks. Security of LEMS has also been studied by Grosso et al. [36], Ye et al. [37], and Zhang et al. [38].
Network security and channel capacity have been studied by Hua et al. [39], Adesso et al. [40], And Yilmaz et al. [41], who introduced a method to estimate the maximum amount of information leakage by some signals generated by the execution of some instructions in a processor.

2.2. Partially Ordered Sets and Their Representations

A partially ordered set or poset is a pair ( P , ) , where P is a possibly empty set endowed with a relation ≤, which is
  • Reflexive, i.e., x x , for any x P ,
  • Antisymmetric, i.e., x y and y x implies x = y , for any x , y P .
  • Transitive, i.e., x y and y z implies x z , for any x , y , z P .
Henceforth, if there is no confusion, we will write P instead of the pair ( P , ) to denote a poset.
Often, finite posets are described by their Hasse diagram, which is a system of sets with the form { P ; C r , L } , where r is a fixed positive real number (small enough) and for each point p P , it is defined a unique point ( x 0 , y 0 ) R 2 and a unique circle c C r with center ( x 0 , y 0 ) and radius r.
The set L consists of non-horizontal lines connecting circles of C r , according to the following rule:
  • A line l connects two circles c and c with centers ( x 0 , y 0 ) and ( x 0 , y 0 ) associated with points p and p in P if and only if p and p is a covering (i.e., if there is z P such that x z y then x = z or y = z ).
As an example, Figure 3 shows a Hasse diagram of a finite partially ordered set P = { a , b , c , d , e , f } such that a < d , b < d , b < e , c < e , and c < f .
A poset P is said to be a chain if for pair of points x , y P , it holds that x y or y x (i.e., any pair of points in a chain are comparable). A poset P is an antichain if its points are incomparable.
The width w ( P ) of a poset P is the size of its largest antichain (e.g., the width of a chain is 1).
If R is a commutative ring and P is a finite poset then a P -subspace U is a system of modules with the form
U = ( U 0 ; U x x P )
where U 0 is an R-module, U x is a submodule of U 0 for any x P , and
U x U y provided that x y in P .
If R is a field then a P -subspace is said to be an R-linear representation (or representation) of the poset P [19,20,21,22].
If U = ( U 0 ; U x x P ) and V = ( V 0 ; V x x P ) are representations of a poset P then their sum U V is a representation given by the following identity.
U V = ( U 0 V 0 ; U x V x x P ) .
The representation 0 has 0 as ground vector space. Furthermore, a representation U is said to be indecomposable if whenever U = U 1 U 2 then either U 1 = 0 or U 2 = 0 . Otherwise, U is said to be decomposable.
A morphism between two representations U = ( U 0 ; U x x P ) and V = ( V 0 ; V x x P ) is an R-linear map φ : U 0 V 0 such that φ ( U x ) V x . φ is an isomorphism if φ ( U x ) = V x , for any x P .
The composition of morphisms between representations is given by the usual composition of R-linear morphisms. The identity morphism associated with a representation U is denoted 1 U such that if φ : U V is a morphism then φ 1 U = φ = 1 V φ .
We let rep P denote the category of representations of a poset P , which is a Krull-Schmidt category.
dim ̲ U denotes the dimension of a representation U of a poset P . It is an integral vector of the form
dim ̲ U = ( d 0 ; d x x P )
where d 0 is the dimension dim R U 0 of the vector space U 0 as vector space. Whereas, d x = dim R U x / z x U z , for any x P .
x = { z P z x } ,   x = x { x } . x = { z P x z } ,   x = x { x } .
One of the problems regarding the theory of representation of posets consists of giving a complete description of the indecomposable representations of the categories rep P defined by finite posets P .
Up-to-date, the algorithms of differentiation have been the main tool to classify posets, the algorithm of differentiation with respect to a maximal point introduced by Nazarova and Roiter and the algorithm of differentiation with respect to a suitable pair of points are the most remarkable algorithms to reach such a classification. They are functors with the main goal of reducing the dimension of the posets involved in the classification process.
The following is the definition of the algorithm of differentiation with respect to a suitable pair of points also known as D I or D I [19]: Let a and b be two points in a finite poset P ( a , b ) then the pair ( a , b ) is said to be suitable for D I , if P ( a , b ) can be written as a sum of the form
P ( a , b ) = a + b + C
where C = c 1 < c 2 < < c n is an n-point chain ( n 0 ).
The derived poset P ( a , b ) is a subset of the modular lattice generated by P ( a , b ) such that
P ( a , b ) = ( P ( a , b ) + C + + C + b ) { C }
where C + and C are n-point chains such that C + = c 1 + < c 2 + < < c n + , and C = c 1 < c 2 < < c n . c i < c i + for all 1 i n , a < c 1 + . Points in P { C } inherit the relations given by P ( a , b ) . In particular, relations between these points and points c i + and c i are given by the relations between them and points c i .
Figure 4 shows Hasse diagrams of a poset P ( a , b ) with a suitable pair of points and its corresponding derived poset.
Differentiation D I or D ( a , b ) : rep P ( a , b ) rep P ( a , b ) is defined by the following identities for a representation U = ( U 0 ; U x x P ( a , b ) ) :
D ( a , b ) ( U ) = U = ( U 0 ; U x x P ( a , b ) ) , U 0 = U 0 , U c i + = U c i + U a , U c i = U c i U b , U x = U x , for the remaining points x P ( a , b ) , φ = φ Hom R ( U , V ) , for any morphism - linear transformation φ : U V rep P .
The following theorem is the main result regarding D I . For each i, 1 i n , p ( a , c i ) = ( U 0 ; U x x P ( a , b ) ) is an indecomposable representation for which, U 0 = R is a field. U x = R is a field, for any x { a , c i } . It is zero for the remaining points in the poset.
Theorem 1
(Theorem 5.6, [19]). The two-point differentiation with completion functor F ( a , b ) = C ( a , b ) D ( a , b ) induces a categorical equivalence between quotient categories
rep P / p ( a , c 1 ) , p ( a , c 2 ) , , p ( a , c n ) rep P ¯ ( a , b ) / p ( a ) .
where p ( a , c 1 ) , p ( a , c 2 ) , , p ( a , c n ) ( p ( a ) ) is the ideal consisting of morphisms which pass through direct sums of objects p ( a , c i ) ( p ( a ) ).

The Matrix Problem

The indecomposable representations of a poset P can be obtained as solutions of a matrix problem. To do that, we note that each representation of P gives rise to a matrix M = M P (a matrix representation) whose columns are partitioned into strips M x labeled by the points of the poset. Columns contained in the strip associated M x consists of coordinates with respect to a fixed basis B of U 0 of generators of the subspace U x . In this case, if C x is the set of columns in the strip M x then s p a n C x = U x .
If M and M are matrix representations of a poset P = { x i 1 i n } with M = M x 1 M x t , M = M x 1 M x t then the direct sum M M of M and M is given by the formula
M M = M x 1 0 M x t 0 0 M x 1 0 M x t
Two representations M and M are said to be equivalent if one can be obtained from the other using the following admissible transformations:
  • Elementary transformations of rows of the whole matrix.
  • Elementary column transformations of the columns within each vertical strip.
  • Addition of columns of a strip M x i .
Equivalent matrices give rise to isomorphic representations of the associated poset.

3. Main Results

We remind readers that an equipped poset P is a poset whose points define a partition of the form P = P + P . If x P ( x P ) then x is said to be a strong point (weak point). Relations R in equipped posets are partitioned into two sets R = R + R , if a pair ( x , y ) R ( ( x , y ) R ) then we write x y ( x y ). In such a case if x y , i.e., ( x , y ) R and y z , i.e., ( y , z ) R then x z . Also, if x y z then x z [20,22].
We assume that the hierarchical attack (see Figure 2) model satisfies the following additional condition:
1.
All the files associated with the malware infecting a network belong to an isolated strong node denoted M.
2.
Each infected node x is encoded by finite sets of { 0 , 1 } -vector columns, S x H x . Columns in S x encode either benign files or malware. Columns in H x encode hidden malware in hard regions.
3.
The files in the malware node M are distributed among a fixed set of weak nodes N 0 , N 1 , N 2 , N n , where N 0 denotes the initial stage of the infection (hidden malware associated with hard regions are contained in H 0 ). c ( N j ) = S j H j S j + 1 H j + 1 , for any 0 j n 1 .
4.
If a node P in the attacked network is infected by a node N j for some 0 j n then it holds that S 0 H 0 S p , where P is encoded by S p H p . Particularly, if P is also infected by a weak node N j , it holds that either S j H j S p H p or S j H j S p .
The following result proves that a hierarchical attack structured by matrices c ( N i ) (Figure 2) defines an equipped poset.
Theorem 2.
A hierarchical attack defined by a strong node M as defined above and weak nodes N 0 , N 1 , , N n with the structure given by a matrix c ( N i ) (see Figure 2) and conditions (1)–(4) defines an equipped poset.
Proof. 
We note that nodes in the infected network are the points in the equipped poset P . Strong nodes correspond to strong points, and weak nodes correspond to weak points in P . The stages of the infection start in N 0 , continue to N 1 and so on. Since, for any pair of weak nodes N i and N j , i < j it holds that S i H i S j H j with H j then N i and N j are weakly related. Moreover, N 0 , N 1 , N 2 , , N n constitute a weak chain, in the sense that its points and relations between them are weak, we write C = N 0 N 1 N 2 N n . Condition (3) proves that relations between weak points N j and another point in P are either weak or strong. Whereas, relations between N 0 and points x P C + M are strong. Finally, we note that by definition the strong point M is incomparable with the other points of the poset P . Therefore, P can be written as a sum with the form P = N 0 + C + M . Where N 0 = { x P N 0 x } . Figure 5 shows an example of an equipped poset induced by a hierarchical attack. Double (single) lines denote strong (weak) relations. In this case, N represents an arbitrary set of infected nodes related to the weak chain N 0 N 1 N n . □
If N x is a node infected by a hierarchical attack with files of type f i j , ( g k l , h m n ) for suitable indexes i , j , k , l , m , n , then s p a n Z 2 { f i j , g k l ) , h m n } is said to be the hull of N x , we let U N x ˜ denote the hull of the node N x . Note that, s p a n { S x H x } = U x U N x ˜ . U N x ˜ = U N x if and only if N x is strong.
U x denotes the strong subspace s p a n { S x } of the subspace U x . In such a case, U x ˜ = s p a n Z 2 + i Z 2 { S x } .
According to the definition of a hierarchical attack and its properties (1)–(4). We note that hidden malware associated with hard regions can be pinpointed by xoring files in U N 0 with files in weak nodes U N j . In such a case, it is built the span sum U N 0 ˜ + U N j , 0 j n .
The detection procedure determines the matrix D shown in Figure 6, labeled above by the infected nodes ( N i , M and N) of a network. The bottom part (under the bold line) is labeled by corresponding symbols N i , N i + . Such symbols denote subspaces spanned by columns whose entries are elements over Z 2 + i Z 2 . We let U x denote the subspace associated with a point x.
U N i 1 U N i , 1 i n (these columns are denoted with the symbol ∗), these subspaces encode pure malware (and weak relations) associated with nodes N i . U N j + U N j + 1 + , 1 j j 1 . Columns associated with symbols H i encode hidden malware pinpointed by the detection process. Such malware can be inserted into the node N 0 by adding some garbage entries denoted I in the matrix D . Relations between subspaces associated with points x P C = { N 0 N 1 N n } keep without changes their relations with the other points of P .
Relations between the infected files allow us to give the next result.
Theorem 3.
The insertion-detection matrix D constitute an equipped poset P d = C + + C + M + N . Where, C + = N 0 + N 1 + N n + and C + = N 0 N 1 N n are chains, M and N and their relations are defined as for the poset P .
Proof. 
By definition, point N 0 + is a strong point. Furthermore, since files associated with the nodes N i constitute malware satisfying the condition U N i 1 U N i , 1 i n , then points N j , 0 j n constitute a weak chain. In particular, N j M , for any j. The same argument for subspaces N j + allow us to infer that N 0 + N 1 + . Since N i + N i + 1 + , 1 i n 1 , it holds that N 0 + N i + . Moreover, N j N j + N j + 1 + , for any 0 j n 1 , N n N n + . Since relations between points N j , N j + and points in subset N { M } are inherited by the relations that these points have with points N 0 , , N n . The following Figure 7 shows the poset P d defined by the insertion-detection matrix D . □
Corollary 1.
The hierarchical attack defined by an equipped poset of type P d has no hidden malware.
Proof. 
The malware used in this type of attack is encoded by subspaces U N j and H j which are induced by simple regions. □
In a more general setting, we can define a functor D ( N 0 , M ) induced by a hierarchical attack defined by an equipped poset of type P and its associated detection algorithm defined by a corresponding equipped poset P d . The following Figure 8 shows the poset P and its detector P d .
If we replace the field Z 2 for the real numbers field and Z 2 + i Z 2 for the complex numbers field. Then ( R , C ) -column transformations between rows and columns of the matrices induced by the linear structure of posets P and P d give rise to categories of representations of the equipped posets P and P d . In such a case, a representation U of an equipped poset P is a system of C -subspaces of the form U = ( U 0 , U x x P ) , with U x U y ( U x ˜ U y ) provided that x y ( x y ).
A morphism φ : U V between two representations U and V of an equipped poset P is a C -linear transformation such that φ ˜ ( U x ) V x . Note that, φ ˜ ( u + i v ) = φ ( u ) + i φ ( v ) , for any pair of appropriated vectors. φ is an isomorphism if and only if φ ˜ ( U x ) = V x for any x P .
Each representation U over the pair of fields ( R , C ) of an equipped poset can be represented by a matrix M with entries over C separated into vertical strips ( M x ; x P ) labeled by the points of P . Columns in M x are generators of U x .
The matrix problem associated with an equipped poset P is defined as follows:
Two matrix representations of an equipped poset are said to be equivalent, if one can be obtained from the other via the following admissible transformations:
  • Elementary transformations over C of rows of whole matrix.
  • Elementary column transformations over C within each vertical strip.
  • Additions of columns of a strip M x to the columns of M y if x y .
  • Independent additions of the real and imaginary part of the columns of a strip M x to the real and imaginary parts of a strip M y if x y .
Note that, if P = c 1 c 2 c n 1 c n is a weak chain then , P ( c i ) , 1 i n , T ( c i ) , and T ( c i , c j ) , 1 i < j n are its only indecomposable representations, where
  • P ( c i ) = ( C ; ( P ( c i ) ) x x P ) , ( P ( c i ) ) x = C , x = c j , i j , ( P ( c i ) ) x = 0 , if j < i .
  • P ( ) = ( C ; ( P ( c i ) ) x = 0 x P ) .
  • T ( c i ) = ( C ; ( T ( c i ) ) x x P ) , ( T ( c i ) ) x = s p a n { ( 1 , i ) t } , x = c j , i j , ( T ( c i ) ) x = 0 , if j < i .
  • T ( c i , c j ) = ( C ; ( T ( c i , c j ) ) x x P ) , ( T ( c i , c j ) ) x = s p a n { ( 1 , i ) t } , x = c s , i s < j , ( T ( c i , c j ) ) x = C ˜ = s p a n { ( 1 , 0 ) t , ( 0 , 1 ) t } , if j s n . ( T ( c i , c j ) ) x = 0 , if s < i .
Theorem 4.
The insertion-detection matrix D defined over the pair of fields ( R , C ) associated with the equipped posets P and P d induces the functor D ( N 0 , M ) : rep P rep P d such that for U = ( U 0 ; U x x P ) rep P it holds that
D ( N 0 , M ) ( U ) = ( U 0 d ; U x d x P ) , U 0 d = U 0 , U N i + d = U N 0 ˜ + U N i , 0 i n , U N i d = U N i U M , 0 i n , U x d = U x , for the remaining points x P , φ d : U d V d = φ : U V , for any linear map - morphism φ : U 0 V 0 .
Moreover, D ( N 0 , M ) is a categorical equivalence between the quotient categories C = rep P / J and C d = rep P d / J d . Where, for fixed U , V rep P , J is the ideal of rep P consisting of morphisms φ : U V that pass through direct sums of the indecomposable objects P ( N 0 ) , T ( N 0 ) , and T ( N 0 , N i ) ) , i.e., J = P ( N 0 ) , T ( N 0 ) , T ( N 0 , N i ) ) 1 i n . The ideal J d is defined in the same fashion, i.e., J d = N 0 + .
Proof. 
Firstly, we note that D ( N 0 , M ) d is an additive functor provided that for all morphisms φ : U V and ψ : V W , it holds that, D ( N 0 , M ) d ( ψ φ ) ( U x ) W x , for any x P , D ( N 0 , M ) d ( 1 U ) = 1 U d , and for any U , V rep P , H o m ( U , V ) is a C -vector space by definition.
Note that, for fixed U , V rep P , it holds that, J ( U , V ) H o m ( U , V ) H o m ( U d , V d ) and J ( U , V ) J d ( U , V ) . Moreover, if [ X , Y ] denotes the morphism-subspace of H o m ( U , V ) whose elements satisfy the condition
φ [ X , Y ] if and only if X ker φ and img φ Y .
Then it is easy to see that for fixed U , V rep P , and a morphism φ : U V it holds that
H o m ( U d , V d ) = H o m ( U , V ) + J ( U d , V d ) , H o m ( U , V ) J ( U d , V d ) = J ( U , V ) .
Thus, any linear morphism δ : C ( U , V ) C d ( U d , V d ) is an isomorphism.
The density of the functor D ( N 0 , M ) follows from the same ideas used to carry out a hierarchical attack to the network defined by the equipped poset P . In such a case, we consider that U N 0 + d = U N 0 + d U M X 0 , where X 0 is complementary subspace, X 0 = s p a n { z 1 , z 2 , , z s } . For these vectors we define corresponding vectors w 1 , w 2 , , w s .
We note that for each i, 1 i n . Any subspace U N i + d of the poset P d { N 0 + M } can be written in the form
U N i + d = U N i 1 + d U N i d H i Y i
where Y i denotes an appropriated complementary subspace. Note that, H i U N 0 + U M (corresponds to hidden malware) and U N i U M (corresponds to pure malware).
Let { h i 1 , h i 2 , , h i n i } be a fixed basis then it is possible to define vectors of the form e i 1 + i h i 1 , , e i n i + i h i n i , for some suitable vectors e i 1 , , e i n i .
Let I 0 = s p a n { w 1 , , w s , e i 1 , , e i n i 1 i n } and { y i 1 , , y i m i } a basis of the subspace Y i then the representation L rep P such that
L 0 = U 0 d I 0 , L N 0 = U N 0 + d U M s p a n { z 1 + i w 1 , z 2 + i w 2 , , z s + i w s } n i j = 1 n i = 1 e i j + i h i j , L N i = U N i 1 U N i d H i n i j = 1 n i = 1 e i j + y i j , L x = U x d for the remaining points x P .
is such that L d = U d ( P ( N 0 + ) ) dim C I 0 . We are done. □

4. Experimental Data

This section applies Theorems 3 and 4 and Corollary 1 to insert and detect images. Firstly, we show a 256 × 256 original image I extracted from specialized datasets such as FERET and Kagle. We then create subspaces associated with a poset P = N 0 N 1 N 2 N 3 N 4 N 5 { M } as follows:
  • The subspace U N 0 associated with the weak point N 0 is given by a linear combination of images with the form
    U N 0 = 9 i = 0 D W ( 0 , i ) + A 10 + 0.01 M 10
    where D W ( 0 , i ) = α i A i + β i M i , 0.01 α i , β i 0.02 .
  • For 1 j 5 , each subspace U N j (associated with a weak point N j ) is given by linear combinations of images with the form
    U N j = γ j N j 1 + δ j M 10 + j + A 10 + j , 0.01 γ j , δ j 0.02 .
    The embedded images M j , 0 j 15 span the subspace U M (associated with the strong point M). They are considered malware for images A j , the construction of the subspace U N j is considered the infection stage.
  • For the detection process, we note that the subspaces U N j are given by the images M 10 + j (i.e., U N j = s p a n { M 10 + j } ), 1 j 5 . These constructions constitute the first step for the detection process.
  • The second step of the detection process consists on building subspaces U N j + given by linear combinations of images with the form
    U N j + = 10 + j i = 0 α j A j + 10 + j i = 0 δ j M j .
    If t { 0 , , 5 } and for 0 j t 5 , it holds that 0.01 δ j 0.02 , δ t = 1 then U N j + reveals M t as a kind of malware infecting the image, A j .
Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14 show examples of images A j (original images), associated with subspaces U N j , U N j (first step), and U N j + (denoted H j in the second step) for 0 j 5 . We compare the associated histograms. We note that the histograms associated with the second step suggest embedded malware.

5. Concluding Remarks and Future Work

Hierarchical attacks designed for peer-to-peer remote control via metamorphic worms induce different algebraic structures. On the one hand, the infection process defines so-called equipped posets. These posets constitute a mathematical model of a hierarchical attack where the nodes are either weak or strong, accordingly of whether the node represents an infection with either hidden malware or pure malware. Pure malware is relatively easy to detect, whereas hidden malware requires deep scanning analysis. Modeling such an analysis gives rise to categories of representations of equipped posets over the pair of fields ( R , C ) , and malware insertion-detection defines a categorical equivalence between quotient categories.

Future Work

Since this work focuses on the algebraic properties of hierarchical attacks, it remains an open problem to determine the properties associated with more general types of infections and NIDS based on deep learning algorithms.
Another task to develop in the future is to apply the proposed theoretical framework to the real field of the intrusion and detection of malware.

Author Contributions

Investigation, writing, review and editing, A.M.C., O.M.M., J.D.C.V. All authors have read and agreed to the published version of the manuscript.

Funding

Center of Excellence in Scientific Computing (CoE-SciCo) Universidad Nacional de Colombia.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

R (Real numbers)
C (Complex numbers)
DI(Algorithm of differentiation with respect to a suitable pair of points)
Poset(Partially Ordered Set)
P (Equipped poset)
(Strong point)
(Weak point)
| | (Strong relation in an equipped poset)

References

  1. Szor, P. The Art of Computer; Virus Research and Defense; Pearson Education Inc.: Hoboken, NJ, USA, 2005. [Google Scholar]
  2. Venkatachalam, S. Detecting Undetectable Computer Viruses. Master’s Thesis, San José State University, San José, CA, USA, 2010. [Google Scholar]
  3. Alzarooni, K.M.A.Y. Malware Variant Detection. Ph.D. Thesis, University College London, London, UK, 2012. [Google Scholar]
  4. Konstantinou, E. Metamorphic Virus: Analysis and Detection; Technical Report; Royal Holloway, University of London: London, UK, 2008. [Google Scholar]
  5. Cohen, F.B. A Short Course on Computer Viruses; Wiley Professional Computing: New York, NY, USA, 1994. [Google Scholar]
  6. Matrosov, A.; Rodionov, E.; Harley, D.; Malcho, J. Stuxnet under the microscope. ESET LLC 2010, 6, 1–85. [Google Scholar]
  7. Ploszek, R.; Švec, P.; Debnár, P. Analysis of encryption schemes in modern ransomware. Rad Hazu Maematičke Znanosti 2021, 25, 1–13. [Google Scholar]
  8. Cannarile, A.; Carrera, F.; Galantucci, S.; Iannacone, A.; Pirlo, G. A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks. In Proceedings of the TASEC’22: Italian Conference on Cybersecurity, Rome, Italy, 20–23 June 2022; Volume 3260, pp. 1–11. [Google Scholar]
  9. Amer, E.; Zelinka, I. A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence. Comput. Secur. 2020, 92, 1–15. [Google Scholar] [CrossRef]
  10. Hu, W.; Tang, Y. Black-box attacks against RNN based malware detection algorithms. In Proceedings of the AAAI Workshops, New Orleans, LA, USA, 2–7 February 2018; pp. 245–251. [Google Scholar]
  11. He, K. Malware Detection with Malware Images using Deep Learning Techniques. Bachelor’s Thesis, University of Canterbury, Canterbury, UK, 2018. [Google Scholar]
  12. Nataraj, L.; Karthikeyan, S.; Jacob, G.; Manjunath, B.S. Malware images: Visualization and automatic classification. In VizSec ’11: Proceedings of the 8th International Symposium on Visualization for Cyber Security; ACM: Pittsburg, PA, USA, 2011; pp. 1–7. [Google Scholar]
  13. Iglesias Perez, S.; Criado, R. Increasing the effectiveness of network intrusion detection systems (NIDSs) by using multiplex networks and visibility graphs. Mathematics 2023, 11, 107. [Google Scholar] [CrossRef]
  14. Kumar, J.; Subbiah, G. Zero-day malware detection and effective malware analysis using shapley ensemble boosting and bagging approach. Sensors 2022, 22, 2798. [Google Scholar] [CrossRef]
  15. Kaspersky Enterprise Cybersecurity. Machine Learning for Malware Detection. 2017. Available online: media.kaspersky.com (accessed on 7 June 2023).
  16. Tayyab, U.-E.-H.; Khan, F.B.; Durad, M.H.; Khan, A.; Lee, Y.S. A Survey of the Recent Trends in Deep Learning Based Malware Detection. J. Cybersecur. Priv. 2022, 2, 800–829. [Google Scholar] [CrossRef]
  17. Aslan, Ö.A.; Samet, R. A comprehensive review on malware detection approaches. IEEE Access 2020, 8, 1–23. [Google Scholar] [CrossRef]
  18. Webster, M.; Malcom, G. Detection of metamorphic and virtualization-based malware using algebraic specification. J. Comp. Virol. 2009, 5, 221–245. [Google Scholar] [CrossRef] [Green Version]
  19. Zavadskij, A.G. On Two Point Differentiation and its Generalization. Algebr. Struct. Their Represent. AMS Contemp. Math. Ser. 2005, 376, 413–436. [Google Scholar]
  20. Zavadskij, A.G. Tame equipped posets. Linear Algebra Appl. 2003, 365, 389–465. [Google Scholar] [CrossRef] [Green Version]
  21. Cañadas, A.M.; Gaviria, I.D.M. Categorical Properties of Some Algorithms of Differentiation for Equipped Posets. Algebra Discret. Math. 2022, 33, 38–86. [Google Scholar]
  22. Cañadas, A.M.; Vargas, V.C. On the apparatus of differentiation DI-DV for posets. São Paulo J. Math. Sci. 2019, 9, 249–286. [Google Scholar] [CrossRef]
  23. Mantovani, A.; Aonzo, S.; Ugarte-Pedrero, X.; Merlo, A.; Balzarotti, D. Prevalence and impact of low-entropy packing schemes in the malware ecosystem. In Network and Distributed Systems Security (NDSS) Symposium; NDSS: San Diego, CA, USA, 2020; pp. 1–15. [Google Scholar]
  24. Lyda, R.; Hamrock, J. Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 2007, 5, 40–45. [Google Scholar] [CrossRef]
  25. Lee, K.; Lee, S.-Y.; Yim, K. Machine learning based file entropy Analysis for ransomware detection in backup systems. IEEE Access 2019, 7, 110205–110215. [Google Scholar] [CrossRef]
  26. Perdisci, R.; Lanzi, A.; Lee, W. Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 2008, 29, 1941–1946. [Google Scholar] [CrossRef] [Green Version]
  27. Ugarte-Pedrero, X.; Santos, I.; Sanz, B.; Laorden, C.; Bringas, P.G. Countering entropy measure attacks on packed software detection. In Proceedings of the Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 14–17 January 2012; pp. 164–168. [Google Scholar]
  28. Raphel, J.; Vinod, P. Information theoretic method for classification of packed and encoded files. In Proceedings of the 8th International Conference on Security of Information and Networks, SIN’15, Sochi, Russia, 8–10 September 2015; ACM: New York, NY, USA, 2015; pp. 296–303. [Google Scholar]
  29. Lim, C.; Ramli, K.; Cheng, W.; Kotualubun, Y.S. Mal-flux: Rendering hidden code of packed binary executable. Digit. Investig. 2019, 28, 83–95. [Google Scholar] [CrossRef]
  30. Menéndez, H.D.; Bhattacharya, S.; Clark, D.; Barr, E.T. The arms race: Adversarial search defeats entropy used to detect malware. Expert Syst. Appl. 2019, 118, 246–260. [Google Scholar] [CrossRef]
  31. Menéndez, H.D.; Llorente, J.L. Mimicking anti-viruses with machine learning and entropy profiles. Entropy 2019, 21, 513. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Chen, S.-W.; Chuang, T.-H.; Tien, C.-W.; Chen, C.-W. An experience in enhancing machine learning classifier against low-entropy packed malwares. Comput. Sci. Inf. Technol. 2021, 11, 4. [Google Scholar]
  33. Cheng, W.; Guilley, S.; Carlet, C.; Danger, J.L.; Mesnager, S. Leakages in code-based masking: A unified quantification approach. Iacr Trans. Cryptogr. Hardw. Embed. Syst. 2021, 2021, 465–495. [Google Scholar] [CrossRef]
  34. Li, Y.; Liu, S.; Guilley, S.; Tang, M. Analysis of multiplicative low entropy masking schemes against correlation power attack. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4466–4481. [Google Scholar] [CrossRef]
  35. Zhang, Z.; Ding, A.A.; Fei, Y. A guessing entropy-based framework for deep learning-assisted side-channel analysis. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3018–3030. [Google Scholar] [CrossRef]
  36. Grosso, V.; Standaert, F.X.; Prouff, E. Low entropy masking schemes, Revisited. In Smart Card Research and Advanced Applications; CARDIS, 2013; Lecture Notes in Computer Science; Fr, A., Rohatgi, P., Eds.; Springer: Cham, Switzerland, 2014; Volume 8419. [Google Scholar]
  37. Ye, X.; Eisenbarth, T. On the vulnerability of low entropy masking schemes. In Proceedings of the Smart Card Research and Advanced Application Conference, Berlin, Germany, 27–29 November 2013. [Google Scholar]
  38. Zhang, Z.; Dofe, J.; Yu, Q. Improving power analysis attack resistance using intrinsic noise in 3D ICs. Integration 2020, 73, 30–42. [Google Scholar] [CrossRef]
  39. Hua, J.; Zhou, Z.; Zhong, S. Flow misleading: Worm-hole attack in software-defined networking via building in-band covert channel. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1029–1043. [Google Scholar] [CrossRef]
  40. Adesso, P.; Cirillo, M.; Di Mauro, M.; Matta, V. ADVoIP: Adversarial detection of encrypted and concealed VoIP. IEEE Trans. Inf. Forensics Secur. 2020, 15, 943–958. [Google Scholar] [CrossRef]
  41. Yilmaz, B.B.; Callan, R.L.; Prvulović, M.; Zajić, A.G. Capacity of the EM covert/side-channel created by the execution of instructions in a processor. IEEE Trans. Inf. Forensics Secur. 2018, 13, 605–620. [Google Scholar] [CrossRef]
Figure 1. Generations of a complex metamorphic virus [1].
Figure 1. Generations of a complex metamorphic virus [1].
Computation 11 00140 g001
Figure 2. Matrix c ( N i ) associated with a node in a hierarchical attack.
Figure 2. Matrix c ( N i ) associated with a node in a hierarchical attack.
Computation 11 00140 g002
Figure 3. Hasse diagram of the poset P = { a , b , c , d , e , f } .
Figure 3. Hasse diagram of the poset P = { a , b , c , d , e , f } .
Computation 11 00140 g003
Figure 4. Hasse diagrams of a poset P ( a , b ) with a suitable pair of points ( a , b ) and its corresponding derived poset P ( a , b ) .
Figure 4. Hasse diagrams of a poset P ( a , b ) with a suitable pair of points ( a , b ) and its corresponding derived poset P ( a , b ) .
Computation 11 00140 g004
Figure 5. Diagram of an equipped poset P induced by a hierarchical attack.
Figure 5. Diagram of an equipped poset P induced by a hierarchical attack.
Computation 11 00140 g005
Figure 6. Diagram of an equipped poset P d induced by a malware detection.
Figure 6. Diagram of an equipped poset P d induced by a malware detection.
Computation 11 00140 g006
Figure 7. Diagram of an equipped poset P d induced by a malware detection.
Figure 7. Diagram of an equipped poset P d induced by a malware detection.
Computation 11 00140 g007
Figure 8. Diagrams of hierarchical attacks with and without hidden malware.
Figure 8. Diagrams of hierarchical attacks with and without hidden malware.
Computation 11 00140 g008
Figure 9. Images associated with the subspace N 0 , in the first step of the malware detection process, we extract simple malware of type M j generating subspaces U N j . In the second step, the algorithm extracts hidden (hard) malware M j defining subspaces U N j + also denoted H j .
Figure 9. Images associated with the subspace N 0 , in the first step of the malware detection process, we extract simple malware of type M j generating subspaces U N j . In the second step, the algorithm extracts hidden (hard) malware M j defining subspaces U N j + also denoted H j .
Computation 11 00140 g009
Figure 10. Images associated with subspaces U N 1 , U N 1 , and U N 1 + .
Figure 10. Images associated with subspaces U N 1 , U N 1 , and U N 1 + .
Computation 11 00140 g010
Figure 11. Images associated with subspaces U N 2 , U N 2 , and U N 2 + .
Figure 11. Images associated with subspaces U N 2 , U N 2 , and U N 2 + .
Computation 11 00140 g011
Figure 12. Images associated with subspaces U N 3 , U N 3 , and U N 3 + .
Figure 12. Images associated with subspaces U N 3 , U N 3 , and U N 3 + .
Computation 11 00140 g012
Figure 13. Images associated with subspaces U N 4 , U N 4 , and U N 4 + .
Figure 13. Images associated with subspaces U N 4 , U N 4 , and U N 4 + .
Computation 11 00140 g013
Figure 14. Images associated with subspaces U N 5 , U N 5 , and U N 5 + .
Figure 14. Images associated with subspaces U N 5 , U N 5 , and U N 5 + .
Computation 11 00140 g014
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cañadas, A.M.; Mendez, O.M.; Vega, J.D.C. Algebraic Structures Induced by the Insertion and Detection of Malware. Computation 2023, 11, 140. https://doi.org/10.3390/computation11070140

AMA Style

Cañadas AM, Mendez OM, Vega JDC. Algebraic Structures Induced by the Insertion and Detection of Malware. Computation. 2023; 11(7):140. https://doi.org/10.3390/computation11070140

Chicago/Turabian Style

Cañadas, Agustín Moreno, Odette M. Mendez, and Juan David Camacho Vega. 2023. "Algebraic Structures Induced by the Insertion and Detection of Malware" Computation 11, no. 7: 140. https://doi.org/10.3390/computation11070140

APA Style

Cañadas, A. M., Mendez, O. M., & Vega, J. D. C. (2023). Algebraic Structures Induced by the Insertion and Detection of Malware. Computation, 11(7), 140. https://doi.org/10.3390/computation11070140

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop