<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Securing Intelligent Autonomous Systems Through Artificial Intelligence</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ganapathy Mani</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bharat Bhargava</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jason Kobes</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Justin King</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>James MacDonald</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Northrop Grumman Corporation</institution>
          ,
          <addr-line>McLean, Virginia</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Purdue University</institution>
          ,
          <addr-line>West Lafayette, Indiana</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <fpage>67</fpage>
      <lpage>71</lpage>
      <abstract>
        <p>Intelligent Autonomous Systems (IAS) reconstruct their perception through adaptive learning and meet mission objectives. IAS are highly cognitive, rich in knowledge discovery, reflective through rapid adaptation, and provide security assurance. It is paramount to have effective reasoning, decision-making, and understanding of operational context since IAS are exposed to advanced multi-stage attacks during training and inference time. Advanced malware types such as file-less malware with benign initial execution phase can mislead IAS to accept them as normal processes and execute malicious code later. IAS are also exposed to adaptive poisoning attacks where adversary inputs malicious data into training/testing set to manipulate the learning. Hence it is vital to monitor IAS activities/interactions to conduct forensics. This project will advance science of security in IAS through multifaceted advanced analytics, cognitive and adversarial machine learning, and cyber attribution based on the following approaches. (a) Implement deep learning-based application profiling to categorize adaptive cyberattacks and poison attacks on machine learning models using contextual information about the origin, trust, and transformation of data. (b) Using HW/OS/SW data to develop perception algorithms using LSTM deep neural networks for detecting malware/anomalies and classifying dynamic attack contexts. (c) Facilitate cyber attribution for forensics through privacy-preserving provenance structure for knowledge representation and perform intrusion detection sampling on HW /OS/SW data. (d) Employ advanced data analytics to aid ontological and semantic reasoning models to enhance decision-making, attack adaptiveness, and self-healing.</p>
      </abstract>
      <kwd-group>
        <kwd>1 autonomy</kwd>
        <kwd>machine learning</kwd>
        <kwd>deep learning</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>lstm</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>International Semantic Intelligence Conference (ISIC 2021), Feb
25-27, 2021, New Delhi, India
EMAIL: bbshail@purdue.edu (A. 2);
️© 2020 Copyright for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>CEUR Workshop Proceedings (CEUR-WS.org)</p>
    </sec>
    <sec id="sec-2">
      <title>1. Solution Overview</title>
      <p>Our focus is on constraints, barriers and
challenges such as poorly understood attack
surfaces, data set training availability and
biases, processing latency, human
understanding of AI results, AI/ML
countermeasures, human-machine disparity,
measurement of effects. We propose novel
approaches for privacy-preserving cyber
attribution, intrusion detection, adversarial
machine learning, malware/anomaly detection,
reasoning, and decision-making. Cyber
attribution involves extracting software,
hardware, and operating system data to
perform intrusion detection sampling (fixed or
dynamic sampling), generating efficient
provenance structure that is populated with
specific data required for a particular analysis
or learning, and labeling and tagging to
properly represent the information obtained.
The processed data is distributed to the
cognitive module where the data is checked
for any malicious data presence through
poison attack filter. The filtered data is
transmitted to cognitive computing module
and knowledge discovery module, where the
data is fed into supervised, unsupervised, and
LSTM models to perform learning and
advanced analytics. Based on multifaceted
dimensions of data analytics, reasoning and
decision-making ability of IAS are enhanced.
The overall architecture of the proposed
model-secure intelligent autonomous systems
with cyber attribution-is demonstrated in
figure 1.
Intelligent autonomous systems receive
large amounts of diverse data from various
data sources. In addition, they operate in a
dynamic operational context and interact
with numerous entities such as other TAS,
UAVs, satellites, sensors, cloud systems,
analysts, malicious actors, and
compromised systems.</p>
      <p>Cyber attribution module constitutes a
stream data processor where data streams
are labeled / tagged on-the-fly for better
knowledge representation and
categorization. This data is stored as
monitored or provenance data with its
origin and historical information. For
preserving privacy, detailed provenance
data is reduced in its scope to include only
necessary data for a particular analysis or
learning. This module uses Provenance
Ontology (PROV-O) structure (elaborated
in a later section) to obscure unnecessary
or privacy-compromising data.
Furthermore, the attribution model
monitors data generated by software
(application parameters), hardware
(memory bytes and instructions), and
operating system (system calls). This data
is used to conduct periodic sampling to
identify signatures of intrusion activities.
Once the data is processed, it goes through
adversarial machine learning model.
Attackers can insert malicious data into
training and testing dataset to influence
machine learning models. In order to
isolate poisonous data, poison data filter
performs methods such as classification of
verified and unverified data as well as
outlier extraction. Once the poisonous data
is removed the data (raw or provenance
data) is sent to Cognitive computing
module and Knowledge discovery module.
In Cognitive computing module, depends
on the data and efficiency of machine
learning methods, malware / anomaly
detection is performed through either deep
learning methodologies such as Long
short-term memory (LSTM) e.g. Recurrent
Neural Networks (RNN) or Convolutional
Neural Networks (CNN) or light-weight
yet powerful machine learning methods
such as Support Vector Machines (SVM),
Random Forests (RF), and K-Nearest
Neighbors (KNN). In addition, cognitive
computing module consists of reasoning

engine, which is driven by rule sets,
semantic, and ontological reasoning. Both
anomaly detection module and reasoning
engine module influence the attack
adaptiveness (reflexivity) and self-healing
of IAS, where decisions obtained through
reasoning and learning are turned into
actions. With this extensive cognitive
computing modules, the final response
from IAS to other interacting entities will
be a secure and trusted one.</p>
      <p>Knowledge discovery module facilitates
multi-faceted dimensions of advanced data
analytics including regression analysis,
supervised learning, unsupervised
learning, and pattern-recognition.
Discovered knowledge is shared with
cognitive computing module for further
learning. The proposed structure provides
robust cyber resilience and autonomous
operation of the system.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Background</title>
    </sec>
    <sec id="sec-4">
      <title>Autonomy on</title>
    </sec>
    <sec id="sec-5">
      <title>Cognitive</title>
      <p>
        Cognitive computing is a vital part of
security in autonomous systems. In particular,
malware and anomaly detection has become a
biggest challenge with increase in
sophistication in attacks such as file-less
malware [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and ransomware [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Behaviorbased malware detection system (pBMDS)
was proposed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The technique observes
unique behaviors of applications as well as
users and leverages Hidden Markov Model
(HMM) to learn application and user behaviors
based on two features: process state transitions
and user operational patterns. One of the
drawbacks of the HMM model is that it has
very limited memory thus cannot be used for
sequential data. In this project, we leverage
hardware, software, and operating system data
and apply long short-term memory units to
identify anomalous behavior. We will also
profile applications and malware using HW
data (memory bytes and instruction sequences)
to whitelist benign processes and blacklist
malicious processes. In order to enable better
results for LSTM deep learning
methodologies, knowledge discovery and
representation are important. We proposed a
metadata labeling scheme, BFC, for
information tagging and clustering by
reversing the error correction coding technique
known as Golay coding [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ][
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The scheme
utilizes 223 number of binary vectors of size
23 bits to profile features and cluster the data
items. Since the method is built based on error
correction scheme, it exhibits fault tolerance in
wrongly labeled data. Similarly, we perform
privacy-preserving knowledge discovery
through perturbed aggregation in untrusted
cloud [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In this project, we will use advanced
data analytics to enable reasoning module for
assisting attack adaptation and reflexivity of
the system.
      </p>
    </sec>
    <sec id="sec-6">
      <title>3. Cognitive Autonomy for</title>
    </sec>
    <sec id="sec-7">
      <title>Cybersecurity in Autonomous</title>
    </sec>
    <sec id="sec-8">
      <title>Systems</title>
      <p>Decentralized machine learning is a promising
emerging paradigm in view of global
challenges of data ownership and privacy. We
consider learning of linear classification and
regression models, in the setting where the
training data is decentralized over many user
devices, and the learning algorithm must run
on device, on an arbitrary communication
network, without a central coordinator. We
plan to utilize and advance COLA, a new
decentralized training algorithm [23] with
strong theoretical guarantees and superior
practical performance. This framework
overcomes many limitations of existing
methods, and achieves communication
efficiency, scalability, elasticity as well as
resilience to changes in data and participating
devices. We will consider fault tolerance to
dropped and oscillation of nodes from
connected to disconnected and attacks on the
nodes. The learning has to be
communicationefficient decentralized framework and free of
parameter tuning. COLA offers full adaptively
to heterogeneous distributed systems on
arbitrary network topologies and is adaptive to
changes in network size and data and offers
fault tolerance and elasticity. IAS should have
clear understanding of its operational context,
it's won processes, and its interactions with
neighboring entities. In this project, the
cognitive computing module consists of three
major components: (1) Malware / anomaly
detection module, (2) Reasoning engine, and (
4) Reflexivity engine. Cyber attribution data
(system monitoring data or provenance data) is
sent to cognitive computing engine for
analysis where the system profiles the
applications based on machine learning
models. In this paper, we will focus on the
cognitive autonomy property of the
autonomous systems.</p>
    </sec>
    <sec id="sec-9">
      <title>4. Malware and Anomalous</title>
    </sec>
    <sec id="sec-10">
      <title>Application Behavior Profiling with Deep Learning Model:</title>
      <p>We use instruction sequences executed in
memory by application to understand the
behavior of each application.</p>
      <p>Input: n-gram sequences of instructions from
memory
Output: Binary classification of benign or
malicious
 Step 1: Define a finite set I of instructions
{i1, i2, ..., in} in the system. Instructions are
executed based on time epochs i.e.,
timeseries data.
 Step 2: Given an observed sequence of {i1,
i2, ..., in}, we find the set N of the top P
sequences to be executed at time t. The
size of the set N varies in each prediction
and is determined by n­grams input as well
as the clusters in the output of the model.
 Step 3: At time t, the sequence {i1, i2, ...,
in} is benign if i1 is in P, otherwise
malicious.</p>
      <p>Algorithm 1: Application Behavioral</p>
      <p>Profiling Algorithm</p>
    </sec>
    <sec id="sec-11">
      <title>5. Malware and Anomaly</title>
    </sec>
    <sec id="sec-12">
      <title>Detection with Light-weight</title>
    </sec>
    <sec id="sec-13">
      <title>Machine Learning Models:</title>
      <p>
        Advanced malware such as ransomware
encrypts IAS data without authorization. Since
it does not alter the system configurations and
leave a footprint, it is difficult to detect them.
But based on the executed instruction
sequences and constants (also known as magic
constants) used for encryption mechanism
during malware execution, applications can be
profiled. First, we will sample the address
spots for every 1,000,000 instructions (fixed
sampling). After a fixed period of time, we
will calculate the frequently occurring
addresses and their relevant process ids. A
threshold T will be set for data extraction. For
example, extract memory bytes and
instructions from top T = 10% of the global
list of sampled addresses (sorted in descending
order based on their frequency of occurrence).
Once opcode and memory bytes data is
collected, we will extract features such as
ngram, bigram, unigram features, magic
constants feature, cosine similarity with
instructions occurrences, and standard
deviation. Cosine similarity metric is one of
the most efficient method to learn from large
datasets [20]. It plays a crucial role in
understanding similarity between two feature
vectors when the magnitude of the vector is
large or unspecified
i.e., it can either be unigram, bigram, or
ngram features. Given two feature vectors Vi =
{f11, f12, ...} and Vi = {f21, f22, ...}, where f11,
f21, . . .are values of a particular feature, the
cosine similarity is given as,
The cosine similarity lies between O and 1. If
the orientation of the two feature vectors is the
same then the similarity between them is Cos
O = 1 i.e., there is zero angle between them.
But when the angle is 90° (the orientation of
the feature vectors is at an angle of 90) then
the
similarity is Cos 90 = 0. The similarity score
varies between [O, ½). Once the features are
extracted, we will implement RF, SVM, and
KNN learning models. K-NN is one of the
simplest yet powerful classifier with high
computational efficiency as well as accuracy
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-14">
      <title>6. Conclusion</title>
      <p>We presented two approaches for detecting
through profiling evasive malware
applications. We use both light-weight
machine learning models as well as deep
learning models to profile and understand the
behavior of autonomous systems. This
multimodel approach is advantages when it comes
to computational resources in mission critical
systems. Based on the data and sample size,
appropriate model can be selected for analysis.
In particular, light-weight machine learning
models use less computational resources and
they have considerably less time complexity.
On the other hand, LSTM model can provide
robust classification with fundamental data,
which enables IAS to understand evasive
malware at basic level.</p>
    </sec>
    <sec id="sec-15">
      <title>7. Acknowledgements</title>
      <p>This research is funded by Northrop
Grumman Corporation.</p>
    </sec>
    <sec id="sec-16">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Hopkins</surname>
            , Michael, and
            <given-names>Ali</given-names>
          </string-name>
          <string-name>
            <surname>Dehghantanha</surname>
          </string-name>
          .
          <article-title>"Exploit Kits: The production line of the Cybercrime economy?"</article-title>
          <source>In Information Security and Cyber Forensics (InfoSec)</source>
          , 2015 Second International Conference on, pp.
          <fpage>23</fpage>
          -
          <lpage>27</lpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] [2]
          <string-name>
            <surname>Kharraz</surname>
            , Amin,
            <given-names>William</given-names>
          </string-name>
          <string-name>
            <surname>Robertson</surname>
            , Davide Balzarotti, Leyla Bilge, and
            <given-names>Engin</given-names>
          </string-name>
          <string-name>
            <surname>Kirda</surname>
          </string-name>
          .
          <article-title>"Cutting the gordian knot: A look under the hood of ransomware attacks."</article-title>
          <source>In International Conference on Detection of Intrusions</source>
          and Ma/ware, and Vulnerability Assessment, pp.
          <fpage>3</fpage>
          -
          <lpage>24</lpage>
          . Springer, Cham,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Xie</surname>
          </string-name>
          , Liang, Xinwen Zhang,
          <string-name>
            <surname>Jean-Pierre Seifert</surname>
            , and
            <given-names>Sencun</given-names>
          </string-name>
          <string-name>
            <surname>Zhu</surname>
          </string-name>
          .
          <article-title>"pBMDS: a behavior-based malware detection system for cellphone devices." In Proceedings of the third A CM conference on Wireless network security</article-title>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>48</lpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Mani</surname>
            , Ganapathy,
            <given-names>Bharat</given-names>
          </string-name>
          <string-name>
            <surname>Bhargava</surname>
            , and
            <given-names>Jason</given-names>
          </string-name>
          <string-name>
            <surname>Kobes</surname>
          </string-name>
          .
          <article-title>"Scalable Deep Learning Through Fuzzy­based Clustering in Autonomous Systems."</article-title>
          <source>In IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AI.KE)</source>
          , pp.
          <source>IEEE</source>
          .
          <year>2018</year>
          . http://www.cs.purdue.edu/homes/bb/aike 2.pdf
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Mani</surname>
            , Ganapathy, Denis Ulybyshev, Bharat Bhargava, Jason Kobes, and
            <given-names>Puneet</given-names>
          </string-name>
          <string-name>
            <surname>Goyal</surname>
          </string-name>
          .
          <article-title>"Autonomous Aggregate Data Analytics in Untrusted Cloud."</article-title>
          <source>In IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AI.KE)</source>
          , pp.
          <source>IEEE</source>
          .
          <year>2018</year>
          . http://www.cs.purdue.edu/homes/bb/aikel .pdf
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Prasath</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          , Haneen Arafat Abu Alfeilat, Omar Lasassmeh, and
          <string-name>
            <given-names>Ahmad</given-names>
            <surname>Hassanat</surname>
          </string-name>
          .
          <article-title>"Distance and Similarity Measures Effect on the Performance of K-Nearest Neighbor Classifier-A Review."</article-title>
          <source>arXiv preprint arXiv:1708.04321</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Bholowalia</surname>
            , Purnima, and
            <given-names>Arvind</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
          </string-name>
          .
          <article-title>"EBK-means: A clustering technique based on elbow method and k-means in WSN."</article-title>
          <source>International Journal of Computer Applications</source>
          <volume>105</volume>
          , no.
          <issue>9</issue>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Mani</surname>
            , Ganapathy, Nima Bari, Duoduo Liao, and
            <given-names>Simon</given-names>
          </string-name>
          <string-name>
            <surname>Berkovich</surname>
          </string-name>
          .
          <article-title>"Organization of knowledge extraction from big data systems."</article-title>
          <source>In 2014 Fifth International Conference on Computing for Geospatial Research and Application</source>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>69</lpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>