<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Spyware Detection Technique Based on Reinforcement Learning</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>City University</institution>
          ,
          <addr-line>London</addr-line>
          ,
          <country country="UK">Great Britain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Khmelnitsky National University</institution>
          ,
          <addr-line>Khmelnitsky</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Aerospace University “Kharkiv Aviation Institute”</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1879</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Analysis of the antivirus technologies, showed that they are not able to detect new spyware with high efficiency, which significantly reduces the reliability and efficiency of its identification. Techniques based on heuristic analysis have a high rate of false positives. The paper presents a new technique for the spyware detection method in computer systems that provides a principle of proactivity and is based on mechanisms machine learning with the reinforcementlearning. The suggested method of spyware detection is based on software behavior analysis in computer systems. The suggested method involves the computer systems monitoring concerning the software, operates with the behavior.</p>
      </abstract>
      <kwd-group>
        <kwd>Spyware</kwd>
        <kwd>Malware</kwd>
        <kwd>Cyberattack</kwd>
        <kwd>API</kwd>
        <kwd>Machine Learning</kwd>
        <kwd>Reinforcement Learning</kwd>
        <kwd>Network</kwd>
        <kwd>Cybersecurity</kwd>
        <kwd>Computer system</kwd>
        <kwd>Host</kwd>
        <kwd>Detection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Today spyware is one of the most common threats on the Internet to businesses and
individual users, since it can steal sensitive information and harm the network [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
Spyware is a type of malware that gathers and relays personal information it to
advertisers, data firms, or external users without the knowledge and consent of the data
owners. There are four main types of spyware: adware, trojan, tracking cookies,
system monitors [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. They use tracking functions to send various private information,
such as a list of visited websites, user's contact email addresses or keystrokes on a
keyboard, screenshots, online activities on computers or mobile devices. Meanwhile,
data obtained by spyware may contain PIN codes, security codes, credit card
numbers, etc. Also, spyware can activate cameras and microphones to watch and listen to
users undetected [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. Some types of spyware can use unauthorized analysis of the
state of security systems, scan ports and vulnerabilities [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Some types of spyware are able to install other additional malware or removing
certain programs and modify the parameters of the operating systems. In addition, this
kind of malware can redirect browser activity, which entails visiting websites blindly
with the risk of virus infection.</p>
      <p>
        Some types of viruses can bring spyware along for the ride as they spread [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
Also, spyware can be included with free versions of the program in order to study the
requirements and interests of users and a revenue obtaining from software sales [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
      </p>
      <p>The main problem is that there is no clear border between benign and malicious
spyware applications when the received information is used to the detriment.
2</p>
      <p>
        Related works
Today solutions to the problems of security are widely presented in the literature. One
of the ways to prevent and defend computer system from the spyware spread is to
construct resilient systems [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], use honeynets [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], implement IDS and security case
assessment [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The paper [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] presents a review of different spyware detection
approaches and tools. Also, a behavioral-based machine learning technique which used
high-level architecture for monitoring and filtering of outgoing packets was proposed.
      </p>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is devoted to investigation concerning the undocumented API calls
and middleware libraries, which are used by the malware creator to steal the user
information remotely by injecting into the process and how hide them from the
antimalware protector. The experimental results of the proposed work showed that the
antimalware protector need to take more attention on API call hooking at network
level injection by X-cross languages.
      </p>
      <p>
        In the paper [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] a cyber kill chain based taxonomy of banking trojans features was
proposed. This threat intelligence is based on the taxonomy providing of a
stage-bystage operational understanding of a cyber-attack. It presented the beneficial to
security practitioners and the design of the evolutionary computational intelligence on
trojans detection and mitigation strategy.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] provides a technique for detection the stealth and obfuscated
spyware and ransomware, including keyloggers, screen recorders, and blockers. The
proposed method is based on a dynamic behavioral analysis through deep and
transparent hooking of kernel-level routines. This paper also presents the anti-spyware
application to track spyware footprints in order to detect and force terminate running
processes, eliminate executable files, and restrict network communications.
      </p>
      <p>
        The works [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11-14</xref>
        ] devoted to keyloggers spyware detecting. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] a new
detection technique that is able to detect the present keyloggers in PC using Support Vector
Machine learning algorithm was presented. In the paper [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] a logging and testing
technique to detect the active keylogger attack was proposed. In the work [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] a
strategy based on the detection manner techniques for userspace keyloggers by matching
I/O of all processes with some simulated activity of the user was proposed.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] presents a survey of keylogger and screenlogger attacks by the
covering basic concepts related to bank information systems and explaining their
functioning, as it presents and discusses an extensive set of plausible countermeasures.
      </p>
      <p>
        The papers [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ] aim to detect spyware threat in mobile Android environment.
The approach proposed in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] based on model checking technique and involvement
temporal logic formulae to identify spyware behaviors.
      </p>
      <p>
        In the work [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] Android spyware detection approach based on a feature
transformation was proposed. This approach transmutes a known malware features into
another domain of features by means using of new feature transformations types. This
allows distinguish three types of malware: rootkit, spyware, and banking trojans from
other malware types and benign applications.
      </p>
      <p>
        The articles [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17-19</xref>
        ] present the approaches for malware detection based on the
software obfuscation techniques and its behavior analysis.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] an approach concerning the modelling of the cyber-attacks’ effects on the
software reliability is presented. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] sustainability issue related to software and IT
reliability, safety and security are discussed.
      </p>
      <p>Nevertheless, the mentioned above approaches have common drawbacks: they
don’t take into account a set of features, that may assign benign and malicious
spyware clearly.
3</p>
      <p>Spyware Detection Technique based on Reinforcement
Learning</p>
      <p>A new spyware detection technique based on reinforcement learning is proposed.
It is a proactive approach for the malware detection, and allows detecting all types of
spyware. The technique is based on mechanisms machine learning and is able to
detect new unknown spyware.</p>
      <p>The suggested method of the spyware identification uses software behavior
analysis in the computer systems.</p>
      <p>The main steps of the proposed approach are presented below:
1. Spyware sample construction.
2. Usage of the reinforcement learning algorithm, the rewards evaluation.
3. Computer systems monitoring concerning the software behavior.
4. Features selection that may indicate the presence of spyware in the computer
systems.
5. Evaluation of the reward for research object.
6. Comparison of the obtained rewards with the rewards values of the known
spyware.</p>
      <p>Let us consider the steps of the method in more detail.
3.1</p>
      <p>Computer systems monitoring concerning the software behavior
In order to conduct the monitoring stage, we are to investigate the spyware
functioning in the computer system. Thus, let us present it as a tuple:
 = 〈 1,  1,  1,  1,  1,  1,  1 1,  1〉,
(1)
where  1 =   – a set of malware’s actions that tells an attacker about its
presence on the network;  1 =   – a set of actions to penetrate the operation system of
the computer system via copying its body into the system directory;  1 = ℎ – a set
of actions that register the spyware’s body into the system registry in order to
automatically start after the operating system restarting;  1 =   – a set of actions for
the messages sending,   – via e-mail;   – via messengers,   ,     1;  1 – an
operating memory of the computer system;  1 =   – a set of actions when an
attacker begins to tap a specified TCP port;  1 =   – a set of actions by which
spyware accesses the command line of the victim's computer (only works when
receiving the message);  1 =   4=1– a set of spyware lifecycle stages;  1 =   – a
set of spyware functions, which is determined by spyware lifecycle stages. Let us
 11
present the function of the infection,  11 ⇒  → {  |  ∈  }, where  – a set of
malicious spyware actions, T - a set of the computer systems in the network,   – an
infected computer system with the spyware. Let u present the function of copying to
the operating system directory and register itself in the system registry  21 ⇒  1
 21
→ {ℎ|ℎ ∈  1} ; a command to re-give the collected data an attacker to the attacker to
 31
listen to the specified TCP/IP port,  31 ⇒  1 →  2′ ; an access function to a command
 41
line of the victim computer  41 ⇒  1 → { | ∈  1}.
3.2</p>
      <p>
        Usage of the Reinforcement Learning
The proposed technique is based on the usage of the reinforcement learning. It is a
new approach in the machine learning. The main idea of it is learn how a research
object’s states are being changed under the specified action in the situation when there
is a single reward feature. During the learning stage aims the achievement of the
target via usage of a reinforcement factor finding the most optimal object’s action to be
performed in each its state. The action is chosen anyway. And after that, the agent is
receiving a new state or a reward. Iterating this process, the specified agent is being
learned that the best action to be obtained is to the expect maximum value as in a
form of rewards [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        Primarily, in each iteration the agent is to be changed its current states s, s∈S and is
to select a specified action a, a∈A. During the state changes the actor also is able to
receive some reward signal with value r, r∈R. In these iterations, in order to get a
useful experience in regards to states, agent, the transition and reward values, the
agent demands best action and the system evaluation corresponding to the learning
procedure [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ].
      </p>
      <p>
        An effective approach for the reinforcement learning usage is the temporal
difference technique [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. It doesn’t involve the environment model of learning and is able
to evaluate the additive calculation with high efficiency.
      </p>
      <p>This approach operates with the agent which is everting to evaluate the value
function on the base of getting the step-by-step reward and the defined reward for the
further object’s state which it obtains.</p>
      <p>
        In this point of view, the most useful and simple method is the Q-learning
approach [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ]. It employs the background information received from object’s state
in the environment, and renews such information about its state in a special Q table.
Such table presents the set of pairs - the state S and action a, and contains Q(S, a) for
each pair. In addition, it involves information concerning each object’s state changes
from St to St+1, and the reward value rt+1, renews the Q table according to formula:
Q(St, at) = Q(St, at) + α[rt+1 + γ maxa Q(St+1, at) − Q(St, at)].
(2)
      </p>
      <p>It means, that whether the agent is selecting the specified action a being in the
specified state S and further is changing it to state S′, it is obtaining the maximum Q
value of next state.</p>
      <p>
        The employment of the reinforcement learning enables the spyware detection via
the usage of the feedback of the reward obtaining, which is able to present data in a
form, that enables a high efficiency identification [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>Spyware detection technique based on reinforcement learning operates with m
specified research object’s states – the set of variants of the API functions, that
perform malicious activity. Thus, the set of research object’s states can be presented as
S={Si, | i = 1, m}.</p>
      <p>In this case, object’s states present the properties of the Markov chains, so it
contains the state’s information corresponding to the past and the present, and it is
important for the training procedure.</p>
      <p>In order to perform spyware detection, the technique has to identify n actions – the
changes concerning executable.</p>
      <p>In the approach we deal with the different categories API calls used for the
spyware execution in the computer system:
1. Registry (registry manipulation for spyware installation, activation, stealth
functioning etc).
2. Network management (managing the network related commands).
3. Memory management (managing the system memory for its hiding, temporary
presence in the system etc).
4. File i/o (file management with stolen information).
5. Socket (socket related commands).
6. Processes and threads (operations with registers, threads for executing main
spyware functioning).
7. Dynamically linked libraries (dll manipulations).</p>
      <p>After the agent has chosen the action it had obtained an answer from the environment
- reward or punishment. It is a of the environment’s feedback corresponded with the
mentioned system action.</p>
      <p>Reinforcement learning deals with quality function. It is the presentation of the
optimal action’s state value, correlated with other actions’ states. The quality function
value dependents on both the state’s and action’s values, e.g. Q(s, a) demonstrates the
Q(s1,a2) the optimal action’s state value of action a2 in the state s1.</p>
      <p>Based on the quality function it's chosen the optimal action’s state value
concerning the current state, which is used for the learning process.</p>
      <p>Employing the reinforcement learning as the approach to the spyware detection, let
us define the correspondence between its notions (environment, action, reward and
agent) and spyware detection items.</p>
      <p>Let's assume the environment item as the representation of the system monitor,
able to extract spyware’s features, which are to be analyzed.</p>
      <p>The result of the analysis is the conclusion about the spyware’s presence or
absence in the computer system, and it is used for the reward definition.</p>
      <p>The reward approach in the reinforcement learning is able to categorize objects via
supervised learning. It answers to agent a question in what way the learning process
may move on concerning object’s actions.</p>
      <p>The mechanism of rewarding has to present the changes that the environment has
executed subsequently the agent implements the action in the current state. Also. It
demonstrates the achievement process to the target – maximum value of the detection
efficiency.</p>
      <p>
        After that, the pair state/reward are sent to the agent. The agent obtains the set of
features that may indicate the spyware’s presence and the reward and uses them for
the system learning via Q-learning algorithm [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>Algorithm 1 operates with the parameters α, which defines the learning speed. In
practice, its optimal value is 0.1, is usually recommended for the learning rate, and we
have used this value as well, and γ – the discount factor, which is used for the
divergence prevention with the value 0.9. The aim off learning is to achieve the optimal
action’s quality value Qmax(s′,a′) for the new system’s states.</p>
      <p>The situation, when the agent has achieved needed values, that is object is the
spyware on benign. While these values haven’t achieved, the algorithm is repeated,
otherwise it is terminated.</p>
      <p>The Q-learning algorithm as a training tool involves the steps,
1. Initialization of the Q(A, s) value to zero for all states and actions.
2. Obtaining of the system’s current state.
3. Choosing procedure for the object’s action on the base of algorithm.
4. The object action performance and gathering of the information via monitoring and
obtaining the rewards concerning this object’s action.
5. The obtaining of the new system state (S') caused by the object’s action
performance.
6. The evaluation of the values Q (A, s) using formula:</p>
      <p>
        Q(St, at )=Q(St,at )+α[r(t+1)+γ maxa (Q(S(t+1),a_t )-Q(St,at))],
(3)
where α=[
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] is the learning rate.
      </p>
      <p>The scheme of the spyware detection process using the reinforcement learning
functioning is presented in Fig.1.</p>
      <p>
        In order to assess the efficiency of the proposed technique a number of
experiments were carried out. For the purpose of the classifier training, the API call
sequence of spyware samples and benign application from dataset [
        <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
        ] were used.
      </p>
      <p>The training dataset included 16350 malicious samples and 14571 benign samples.
All malicious samples were divided into 6 spyware classes: adware, keyloggers,
infostealers, red shell spyware, tracking cookies, rootkits.</p>
      <p>
        In order to determine effectiveness of the proposed spyware detection technique
17231 spyware samples from evaluation dataset [
        <xref ref-type="bibr" rid="ref29 ref30 ref31 ref32">29-32</xref>
        ] were employed. Also, the test
data contained 16298 samples of benign applications.
      </p>
      <p>
        The experimental results were estimated using standard detection metrics [
        <xref ref-type="bibr" rid="ref33 ref34 ref35 ref36 ref37 ref38 ref39 ref40">33-40</xref>
        ]:
sensitivity (SN); specificity (SP); overall accuracy (E); True Positives (TP); True
Negatives (TN); False Positives (FP); False Negatives (FN).
      </p>
      <p>SN =TP/(TP + FN), SP =TN/ (TN + FP), E=(TP + TN)/(TP + TN + FP + FN)
(4)</p>
      <p>Distribution of the malicious samples that involved the experiments by spyware
classes and results of experiments are presented in the Table 1.</p>
      <p>The experimental results show that usage of the reinforcement learning
demonstrated ability to detect spyware with the efficiency in the range of 95,63 to 99,05%
with the false positives in the range of 0,02 to 0,28%.</p>
      <p>Spyware
types
adware
keyloggers
infostealers
red shell
spyware
tracking
cookies
rootkits
Total
number</p>
      <p>Number
of
spyware
samples
2419</p>
      <p>The work presents the technique for the spyware detection method in computer
systems that provides a principle of proactivity and is based on mechanisms of
machine learning with the reinforcement. The suggested method of spyware detection
uses software behavior analysis in computer systems. The suggested method involves
the computer systems monitoring concerning the software, operates with the behavior.</p>
      <p>Experimental research demonstrated a promising result of the detection ability of
the proposed approach, while the false positives rate is low.</p>
      <p>The further work may be devoted to the development of the techniques that
involve other machine learning algorithms and spyware features analysis.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Norton</surname>
          </string-name>
          .
          <article-title>What is spyware? And how to remove it</article-title>
          . Available online: https://us.norton.
          <article-title>com/internetsecurity-how-to-catch-spyware-before-it-snags-you</article-title>
          .
          <source>html (аccessed on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Eset</surname>
          </string-name>
          . Spyware. Available online: https://help.eset.com/glossary/en-US/spyware.
          <source>html (аccessed on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Avast</surname>
          </string-name>
          . Spyware: Detection, Prevention, and Removal. Available online: https://www.avast.com/c-spyware
          <source>(аccessed on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Drozd</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rucinski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochanski</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garbos</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maevsky</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Development of Models in Resilient Computing</article-title>
          ,
          <source>Proc. of 10th IEEE International Conference on Dependable Systems, Services and Technologies</source>
          , pp.
          <fpage>2</fpage>
          -
          <lpage>7</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Sokol</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zuzčák</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sochor</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <article-title>Definition of attack in the context of low-level interaction server honeypots</article-title>
          .
          <source>Lecture Notes in Electrical Engineering</source>
          <volume>330</volume>
          ,
          <fpage>499</fpage>
          -
          <lpage>504</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Potii</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Illiashenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Advanced Security Assurance Case Based on ISO/IEC 15408</article-title>
          . In: Zamojski W.,
          <string-name>
            <surname>Mazurkiewicz</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sugier</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walkowiak</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kacprzyk</surname>
            <given-names>J</given-names>
          </string-name>
          . (eds)
          <article-title>Theory and Engineering of Complex Systems and Dependability</article-title>
          .
          <source>DepCoSRELCOMEX. Advances in Intelligent Systems and Computing</source>
          , Springer, Vol.
          <volume>365</volume>
          , pp.
          <fpage>391</fpage>
          -
          <lpage>401</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Afzulpurkar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alshemaili</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>Outgoing Data Filtration for Detecting Spyware on Personal Computers</article-title>
          . In: International Conference on Emerging Internetworking,
          <source>Data &amp; Web Technologies</source>
          . Springer, Cham, pp.
          <fpage>355</fpage>
          -
          <lpage>362</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Prabhavathy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maheswari</surname>
            ,
            <given-names>S. U.</given-names>
          </string-name>
          <string-name>
            <surname>Remote Network Injection Attack Using X-Cross</surname>
            <given-names>API</given-names>
          </string-name>
          Calls.
          <source>In: International Conference on Emerging Current Trends in Computing and Expert Technology</source>
          . Springer, Cham, pp.
          <fpage>1399</fpage>
          -
          <lpage>1404</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kiwia</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dehghantanha</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choo</surname>
            ,
            <given-names>K. K. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slaughter</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence</article-title>
          .
          <source>Journal of computational science</source>
          , Vol.
          <volume>27</volume>
          , pp.
          <fpage>394</fpage>
          -
          <lpage>409</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Javaheri</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hosseinzadeh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahmani</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          <article-title>Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines</article-title>
          .
          <source>IEEE Access</source>
          ,
          <year>2018</year>
          ,
          <volume>6</volume>
          :
          <fpage>78321</fpage>
          -
          <lpage>78332</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Pillai</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siddavatam</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <article-title>A modified framework to detect keyloggers using machine learning algorithm</article-title>
          .
          <source>International Journal of Information Technology</source>
          ,
          <volume>11</volume>
          .4:
          <fpage>707</fpage>
          -
          <lpage>712</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Mallikarajunan</surname>
            ,
            <given-names>K. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Preethi</surname>
            ,
            <given-names>S. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Selvalakshmi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nithish</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <article-title>Detection of Spyware in Software Using Virtual Environment</article-title>
          .
          <source>In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)</source>
          . IEEE, pp.
          <fpage>1138</fpage>
          -
          <lpage>1142</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wajahat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Imran</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Latif</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazir</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>A Novel Approach of Unprivileged Keylogger Detection</article-title>
          .
          <source>In: 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)</source>
          . IEEE,
          <year>2019</year>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sbai</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldsmith</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meftali</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Happa</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>A survey of keylogger and screenlogger attacks in the banking sector and countermeasures to them</article-title>
          .
          <source>In: International Symposium on Cyberspace Safety and Security</source>
          . Springer, Cham, pp.
          <fpage>18</fpage>
          -
          <lpage>32</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Fasano</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martinelli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mercaldo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardone</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santone</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Spyware</surname>
          </string-name>
          <article-title>Detection using Temporal Logic</article-title>
          .
          <source>In: 5th International Conference on Information Systems Security and Privacy</source>
          ,
          <string-name>
            <surname>ICISSP</surname>
          </string-name>
          <year>2019</year>
          . SciTePress, pp.
          <fpage>690</fpage>
          -
          <lpage>699</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subrahmanian</surname>
            ,
            <given-names>V. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Android Malware</surname>
          </string-name>
          <article-title>Detection via (Somewhat) Robust Irreversible Feature Transformations</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicheporuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>B. Metamorphic Viruses</given-names>
          </string-name>
          '
          <article-title>Detection Technique Based on the Equivalent Functional Block Search</article-title>
          . CEUR-WS, ISSN:
          <fpage>1613</fpage>
          -
          <lpage>0073</lpage>
          , Vol.
          <year>1844</year>
          , pp.
          <fpage>555</fpage>
          -
          <lpage>569</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicheporuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <article-title>Approach for the Unknown Metamorphic Virus Detection</article-title>
          .
          <source>The 9-th IEEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications: Proceedings</source>
          , vol
          <volume>1</volume>
          , pp.
          <fpage>453</fpage>
          -
          <lpage>458</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lysenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobrovnikova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kryshchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Self-adaptive system for the corporate area network resilience in the presence of botnet cyberattacks</article-title>
          .
          <source>Communications in computer and information science</source>
          , pp.
          <fpage>385</fpage>
          -
          <lpage>401</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Popov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks</article-title>
          .
          <source>IEEE 28th International Symposium on Software Reliability Engineering</source>
          , pp.
          <fpage>228</fpage>
          -
          <lpage>239</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kacprzyk</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          . (eds).
          <article-title>Concepts of Green IT Engineering: Taxonomy, Principles and Implementation</article-title>
          . Green IT Engineering: Concepts,
          <source>Models, Complex Systems Architectures. Studies in Systems, Decision and Control</source>
          , Springer, Cham, Vol.
          <volume>74</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>19</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Morales</surname>
            ,
            <given-names>E.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaragoza</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          <article-title>An introduction to reinforcement learning', in</article-title>
          <string-name>
            <surname>Sucar</surname>
          </string-name>
          , L.E.,
          <string-name>
            <surname>Morales</surname>
            ,
            <given-names>E.F.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hoey</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          . (Eds.):
          <article-title>Chapter in Decision Theory Models for Applications in Artificial Intelligence: Concepts and Solutions</article-title>
          , Vol.
          <volume>19</volume>
          , No.
          <issue>4</issue>
          , pp.
          <fpage>639</fpage>
          -
          <lpage>668</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Jagielski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oprea</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Biggio</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nita-Rotaru</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <article-title>Manipulating machine learning: Poisoning attacks and countermeasures for regression learning</article-title>
          .
          <source>In 2018 IEEE Symposium on Security and Privacy (SP)</source>
          , IEEE, pp.
          <fpage>19</fpage>
          -
          <lpage>35</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Buffet</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dutech</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Charpillet</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <article-title>Shaping multi-agent systems with gradient reinforcement learning</article-title>
          .
          <source>Autonomous Agents and Multi-Agent Systems</source>
          , Vol.
          <volume>15</volume>
          , No.
          <issue>2</issue>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>220</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Gomes</surname>
            ,
            <given-names>E. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalczyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>Dynamic analysis of multiagent Q-learning with e-greedy exploration</article-title>
          .
          <source>In Proc. Int. Conf. Mach. Learn.</source>
          , pp.
          <fpage>369</fpage>
          -
          <lpage>376</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Matiisen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <article-title>Demystifying deep reinforcement learning</article-title>
          .
          <source>Computational Neuroscience LAB</source>
          ,
          <volume>19</volume>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27. VirusShare. Available online: https://virusshare.com
          <source>/ (аccessed on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Nexginrc</surname>
          </string-name>
          . Datasets. Available online: http://nexginrc.org/Datasets/Default.aspx (аccessed
          <source>on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Kaggle</surname>
          </string-name>
          .
          <article-title>Microsoft Malware Classification Challenge (BIG</article-title>
          <year>2015</year>
          ).
          <article-title>Classify malware into families based on file content and characteristics</article-title>
          . Available online: https://www.kaggle.com/c/malware-classification
          <source>(аccessed on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Ronen</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feuerstein</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yom-Tov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahmadi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Microsoft malware classification challenge</article-title>
          . arXiv preprint arXiv:
          <year>1802</year>
          .
          <volume>10135</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. GitHub.
          <article-title>Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers</article-title>
          . Available online: https://github.com/ocatak/malware_api_
          <source>class (аccessed on March 20</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Catak</surname>
            ,
            <given-names>F. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yazı</surname>
            ,
            <given-names>A. F.</given-names>
          </string-name>
          <article-title>A Benchmark API Call Dataset for Windows PE Malware Classification</article-title>
          . arXiv preprint arXiv:
          <year>1905</year>
          .
          <year>01999</year>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Pomorova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kryshchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobrovnikova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>A technique for the botnet detection based on DNS-traffic analysis</article-title>
          .
          <source>Communications in Computer and Information Science</source>
          , Vol.
          <volume>522</volume>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>138</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Grażyna</surname>
            <given-names>Suchacka</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Jacek</given-names>
            <surname>Iwański</surname>
          </string-name>
          .
          <article-title>Identifying legitimate Web users and bots with different traffic profiles - an Information Bottleneck approach</article-title>
          .
          <source>Knowledge-Based Systems</source>
          , Vol.
          <volume>197</volume>
          ,
          <issue>105875</issue>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Komar</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golovko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorosh</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Compression of Network Traffic Parameters for Detecting Cyber Attacks Based on Deep Learning</article-title>
          .
          <source>Proceedings of IEEE 9-th International Conference on Dependable Systems Services and Technologies</source>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>47</lpage>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Obeidat</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>AlZubi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Developing</surname>
          </string-name>
          <article-title>a faster pattern matching algorithms for intrusion detection system</article-title>
          .
          <source>International Journal of Computing</source>
          ,
          <volume>18</volume>
          (
          <issue>3</issue>
          ),
          <fpage>278</fpage>
          -
          <lpage>284</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37. Canadian Institute for Cybersecurity. Malware dataset, https://www.unb.ca/cic/datasets/botnet.html (
          <issue>accessed January 10</issue>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <given-names>API</given-names>
            <surname>Monitor</surname>
          </string-name>
          . Availabe: http://www.rohitab.com/apimonitor (accessed
          <source>January 10</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Lysenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobrovnikova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kryshchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>BotGRABBER: SVM-based self-adaptive system for the network resilience against the botnets' cyberattacks</article-title>
          .
          <source>Communications in computer and information science</source>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>143</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <given-names>VX</given-names>
            <surname>Heavens</surname>
          </string-name>
          <article-title>Computer virus collection</article-title>
          . Availabe: http://vx.netlux.
          <source>org (accessed January 10</source>
          ,
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>