<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>O. Tarasova);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Pavlo Rehidaa, Tomas Sochor b, Valeriy Martynyuka , Olha Tarasovaa and Viktoriia Orlenkoa</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>Institutska str., 11, Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Prigo University</institution>
          ,
          <addr-line>Havirov</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1916</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The article proposes a model for distributed malware detection using sandbox technology. The analysis of modern malware detection tools and an overview of existing attacks were carried out. The justification of the selected detection method to be used by the model is carried out. Its main disadvantages are identified and the use of the distributed system as its solution is proposed. The key features of the use of heterogeneous computer systems for calculations and their adaptation to perform the task were considered. Detection of malware is proposed to be solved by analyzing the states of sandboxes, and evenly distributing these states among the computational elements of the system. Analysis how these states are changing will signal about potentially malicious software that uses anti-emulation techniques, thereby allowing the detection of malware. The basic set of levels of the proposed model is presented. The main tasks for the protection of calculations are defined, taking into account that the model will work in system with dynamical topology. The basic concept of load distribution between computing elements is proposed in order to ensure the synchronous operation of the system, taking into account the heterogeneity of the system. Two main strategies for protecting computing both at the level of computational elements and at the level of intermediate servers are defined. A basic algorithm for adding new elements to the system is proposed, and the use of a rating model is presented, which will ensure an appropriate level of protection of calculations. Malware detection, distributed computing, heterogenous computer systems, anti-malware IntelITSIS'2023: 4th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 22-24,</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the modern world, the use of IT is widespread in almost all spheres of life, which greatly
facilitates the completion of everyday tasks. Services based on the use of IT actively use personal or
corporate information, which makes them very convenient to use. We trust our personal data to
software and mobile applications, store it in cloud environments, companies use IT to automate
internal processes, and conveniently operate confidential documents, etc. Therefore, the issue of the
security of such information is important and considering the trends in their development [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ], and it
is necessary to investigate new methods and approaches of detecting malware.
      </p>
      <p>The problem of malicious software in particular lies in several aspects, namely: the total number of
already existing ones; speed of appearance of new ones; speed of appearance of new types; also with
new software and hardware comes new vulnerabilities comes too. Considering all these factors, it is</p>
      <p>2023 Copyright for this paper by its authors.
necessary to look for new ways of detecting malicious software, to use successes in other areas of IT
to form a combined method that will effectively fulfil the task.</p>
      <p>
        In paper [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], a thorough study was conducted on the dependence between the complexity of
computer viruses and the probability of their detection. Thus, a comparison of the effectiveness of
modern existing threat detection tools is carried out here, having previously divided them into the
following categories: static threat detection [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], dynamic threat detection and modern web service
solutions. Static tools include software analysers that can determine the application compilation time,
check whether the application was packed by the UPX packager (which is often used for virus
packaging [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]), check which functions and DLLs are used when the program is launched. Dynamic
detection [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is generally based on the use of a certain environment that allows you to observe its
behaviour, namely: compare the status of registers [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], analyse the activity of processes and their
impact on the operating system, and create an isolated environment for testing new software. Web
service solutions usually use both detection approaches and are mostly free to use, but have one
drawback, which is the maximum size of the file (software) that can be analysed.
      </p>
      <p>One of the best methods for detecting malware is using sandboxes, as they provide full control
over an isolated environment that will allow you to analyse the executable file. The main problem
with the use of such tools is the significant need for computing resources. The purpose of this work is
to present a method of testing software for anomaly behaviour by using a distributed sandbox system.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Emulation as an approach of detecting malicious software.</title>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] presents a wide analysis of the use of modern tools for detecting malware, but if we
analyse the test results for the selected set of malware, we can see that the largest percentage of
detected threats is associated with the use of a sandbox, if we consider each technology separately.
Symantec uses emulation technology to create an isolated environment, to test potentially malicious
software. Emulators can use various techniques to search for viruses [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], in particular Cuckoo
sandbox [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] uses the behavioural features of binary files. Independent studies performed by NSS Labs
Breach Detection System Test in 2017. They showed the advantages of complete emulation of the
system in the tasks of detecting malware. Lastline's sandbox, which uses emulation, has reached a
100% threat detection rate.
      </p>
      <p>Therefore, emulation occupies an important place among the approaches that can protect computer
systems. The following advantages of using this technology are determined:
1. Controlled environment for software testing.
2. Protection of hardware, operating systems, and the registry.
3. If malicious is detected, the sandbox is removed, which ensures the protection of the host.
4. Emulation technology eliminates incompatibility problems with software or hardware.</p>
      <p>The disadvantages include the usual need for all software to constantly update, because older
versions may contain security gaps and the fact that the sandbox technology requires large computing
resources. It is important to take these features into account when creating a new tool for detecting
malware. Also, before passing the malware check, the software will be considered as potential
malware.</p>
      <p>
        In addition to a large number of types of malwares, a large number of their pre-detection
techniques are determined, which include: self-encryption and self-decryption, junk code, usage of
equivalent instructions, block reordering [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], polymorphism, metamorphism, disguise and so on.
Considering these tools from the point of view of using an emulator, such techniques are defined as
anti-emulation, and are classified as obfuscation techniques. To detect emulation, the following are
used: timing attacks, CPU semantics attacks, hardware characteristic attacks, fake API calls [
        <xref ref-type="bibr" rid="ref11 ref12">11,12</xref>
        ],
structured exception handling. [
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ]
      </p>
      <p>
        Timing CPU attacks include attacks that generally involve measuring the time required for a
particular operation by the processor. These attacks are used to obtain cryptographic keys. Modern
processors use the transition prediction module to build an effective order for executing instructions.
Such attacks are aimed at confusing these queues, after which the processor will have to rebuild the
execution queue [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>CPU semantics attacks are aimed at analyzing the execution of instructions and their semantics.
The developers of such attacks are guided by a well-formed set of instructions that will shift the
execution of certain instructions so that important sensitive data remains in the cache.</p>
      <p>Hardware characteristic attacks work with an attempt to use additional instructions to track
changes in physical characteristics (such as electricity consumption), or to use error injections that
will manipulate its behavior.</p>
      <p>Fake API calls use scripts or programs that mimic the behavior of an authorized user or program
and are used to search for system vulnerabilities.</p>
      <p>Structured exception handling attacks uses an exploit to search for vulnerabilities in its
mechanism, which involves overwriting the SEH chain, which will allow you to gain control of the
program and execute needed code. A similar result can be obtained using a buffer overflow.</p>
      <p>
        The attacks described above at first glance will not carry a threat, given that they are launched in a
controlled environment. However, malware developers can use the results of their execution to
analyze the external environment [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], and if emulation has been detected, then all malware actions
are masked or stopped until the environment changes. Malware will wait for changes in the
environment in which it operates in order to prevent it from being exposed and to continue performing
its tasks. Taking into account these behaviors, it is proposed to introduce the concept of the sandbox
state. The sandbox state accepts a certain set of characteristics that define it (command processing
time, number of processes running, etc.) at a certain point in time. Define single state as,  1 then the
set of states will depend on the number of characteristics ( ∗  ), so all state will be defined as:
  = { 1,  2 …   2}
      </p>
      <p>
        One of the biggest advantages of using sandboxes is full control over it and its state, so in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] the
proposed sandbox analyzes potential malware at 3 basic levels, namely: static analysis, real-time
analysis and network analysis of malware. Modern technologies like machine learning also used in
order to increase the malware detection rate by sandboxes, and based on RF, NN, DT and SWM
algorithms [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Heuristic scanning also used as additional method of malware detection that based on
examining its behaviour and characteristics. This approach based on three procedures: pattern
matching, automatic learning, and environment emulation. In paper [19] this approach was analysed
and one of the key conclusions is that it has high rate of false positive report, but combining both
technologies: heuristic scanning and sandbox may help to achieve more reliable security results.
Using the sandbox, we can record its state, throughout the entire potential malware set of commands,
follow the behavior of the executable file during its operation [20] or, for example, generate a hash
value, each step taking into account the result of the previous state, as this happens when using smart
contracts. Thus, we will form a kind of imprint of the potential malware execution in the sandbox.
      </p>
      <p>Considering anti-emulation techniques and changing sandbox states, we can assume that if we
provide each potential malware with the required number of sandboxes with all sets of states that
cover the processing of all anti-emulation techniques, we will be able to detect malware.</p>
      <p>This approach will increase the success of the detection of malware, but it has one drawback: it is
necessary to provide a large amount of computing resources to maintain all sandbox states for
potential malware. Therefore, it is necessary to suggest a model that will meet all the described
requirements.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Model of the distributed detection system using sandboxes.</title>
      <p>Distributed computing has begun to be used in many areas of life. They are used to model natural
processes, test hypotheses, help determine whether scientific research is taking place in the right
direction. They have various forms and uses different approaches in relation to their organization.
With the widespread use of IoT, the amount of data has also increased, and the importance of its
processing also leads to the wide development of distributed computing. Since the widespread use of
distributed computing, it is necessary to find a way of involving it in the issues of data security.</p>
      <p>To solve the problem, it is proposed to use a distributed computing system. But first we will
characterize it. Since, that it is a huge number of various components that is used to create computers
and workstations, we can determine that designing a heterogeneous distributed computing system will
be the most optimal approach. In addition, such systems form the most effective, in terms of
computing resources, solutions [21], and a distributed computing system based on the use of volunteer
resources, at peak times, had computing power that was 10 times greater than IBM Summit [22].</p>
      <p>Let’s define the main components of the model taking into account its features:
 Server.
 Set of intermediate servers.
 Computing elements with an emulator for detecting malware.
 Distributed signature database.</p>
      <p>This system provides a single-entry point for all users, that is, a server. All users (who have
access) will be able to transfer through a web client or with the help of the application to send
executable files for checking. It is assumed that the system will have a large number of computing
elements, so the server will process incoming files using intermediate servers ( =
{ 1,  2, …   }, where  – intermediate computing system, and  – their number), which will
control a certain number of computing devices ( = { 1,  2, …   }, where  – computing
element, and  – their number). The choice of an intermediate server is based on the current level of
workload at the moment of each of them. After receiving the executable file, the intermediate server
randomly distributes among all members of the network a set of states for which each of them is
responsible, to cover all the necessary states (Fig. 1.). If a malware is detected, the intermediate server
will update the signature database.</p>
      <p>Each computing element during the operation of the system, in a certain period, will return one or
more results of checks – imprints. All imprints are collected on the intermediate server, and the results
are compared. Since each computing element uses the same emulator, it is expected that the imprint to
be the same for all states of the same potential malware.</p>
      <p>In general, each subsystem and its computing elements should work synchronously only in the
middle of the subsystem itself since each subsystem works independently of each other. Also, for
each subsystem, intermediate servers should be duplicated, since in case of failure of any of them, the
computing elements should be able to send their results to the additional one.</p>
      <p>Let's determine what answers the intermediate server can receive from its entire group:
 The task is completed, the format of the answer is correct.
 The task is completed, the format of the answer is not correct.
 The computing element did not finish task according to the time provided, instead of
answering, a special message arrives, the computing element perform test check again, and joins
another group with other characteristics, the level of trust in it decreases.
 Computation error notification.
 The answer did not come (a decrease of trust level in database that stores information about
existing computing elements is recorded).</p>
      <p>Considering the received answers, the system should be able to constantly balance groups of
computing elements, this will allow to perform the tasks efficient and secure. In addition, intermediate
servers should check each other's work. Since, intermediate servers are part of controlled system, it is
possible to use additional security approaches, so it is possible to use some kind of simplified checks.
The simplified checking approach basically stands for partial checks, in which each intermediate
server will choose a certain part of its completed tasks, and send them to the main server with a
special mark. Such tasks will undergo a full cycle of checks by all computing elements of another
subsystem. If one intermediate server has completed for example ten tasks, the other intermediate
server can choose randomly few of them at random and complete them too, and if the results match
both of intermediate servers can trust each other. These checks can also be initiated by the main
server.</p>
      <p>We can present the whole system as follows:
where,</p>
      <p>– abstract distributed malware detection system, 

= {
1 … 
 , 
11 … 
1 , 
that perform potential malware analysis in different states, 
malware (1 …</p>
      <p>– number of potential malwares, 1 …   - number of states to check), 
intermediate servers that works with 
,</p>
      <p>– main server,  – signature database.</p>
      <p>The proposed abstract system will be as follows:
11 … 
1 … 
1 , 
1
,  }
… 
 – computing elements

 - potential
1 …   –</p>
      <sec id="sec-3-1">
        <title>User</title>
      </sec>
      <sec id="sec-3-2">
        <title>Signature</title>
      </sec>
      <sec id="sec-3-3">
        <title>Database</title>
      </sec>
      <sec id="sec-3-4">
        <title>Main Server</title>
      </sec>
      <sec id="sec-3-5">
        <title>Subsystem 1</title>
      </sec>
      <sec id="sec-3-6">
        <title>Subsystem 3</title>
      </sec>
      <sec id="sec-3-7">
        <title>Subsystem 2</title>
        <p>In addition to the overall operation of the system, it is also necessary to describe the process of
protecting the execution of calculations. The type of calculations described above involves the use of
voluntary participants who propose to attract their computing resources to solve the problem.
Although, this approach solves the problem of the necessary computing resources, it imposes one
limitation, namely: complete trust in any member of the network is impossible. And this situation
arises due to the inability to control all computing elements, so it is important to provide options for
how to protect the results of calculations themselves from
distortions of those interested in
compromising such systems. Another important task is to protect intermediate servers from various
types of attacks, in particular, it is necessary to pay attention to protection against DDoS attacks. The
stability of each such element of the system affects the performance of the whole system. In paper
[23], the difficulty of detecting the type of such attacks is considered, and their types are presented.
Paper [24] presents a model that uses ML in real time to detect DDoS traffic. Such tools are useful to
consider and implement as an additional module for the protection of a distributed computing system.
Also, since the system is defined as heterogeneous, it will be necessary to identify the mechanisms for
the correct distribution of tasks between the participants, taking into account their computational
resources.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Evaluation performance efficiency of computational tasks</title>
      <p>Considering the heterogeneity of the proposed model [25,26], attention should also be paid to the
correct distribution of the complexity of the tasks. The first task is to try to identify its current
computing elements. The system can store certain information about them, such as IP address,
processor model, number of physical and logical cores, amount of RAM, etc. You can supplement
this data with behavioral features, system time, session duration, number of completed tasks and so
on. By combining both sets of knowledge, you can try to identify each user the next time when it
connects to the system. This is important for several reasons, in terms of the efficiency of using
computing resources. The problem of stabilizing the system [27] in such conditions is very important,
and it is these methods that will help to solve it in some aspects.</p>
      <p>When adding a new computing element to an intermediate server, the following actions are
performed:
1. The system records all possible characteristics about the new computing element.
2. Sends a set of already completed tasks with varying complexity.
3. Records the results of performed tasks and sets assessment of efficiency.
4. Checks the correctness of completed tasks, and if all tasks are completed correctly (assigns a
trust level of computing element as 50%.
5. Adds a new element in specific group (algorithmically chooses the best group: chooses a
group where there are not enough computing elements, or with an excess of such in other group –
forms a new group, taking into account the rate of delay in packet transmission).
6. At a certain time interval, updates basic user information to have the most accurate data about
computing element.</p>
      <sec id="sec-4-1">
        <title>Allowed</title>
        <p>computing
element</p>
      </sec>
      <sec id="sec-4-2">
        <title>Allowed computing element</title>
      </sec>
      <sec id="sec-4-3">
        <title>Finished tasks</title>
      </sec>
      <sec id="sec-4-4">
        <title>Allowed</title>
        <p>computing
element</p>
        <p>Element
performing</p>
        <p>testing
calculations
before been
added to
group</p>
        <p>Considering that the system cannot hope for regular cooperation with each computing element, it
is necessary to use all possible ways to reduce the time to check and find the appropriate group for the
newly connected element to perform a real task. By recording information about participants, the
system can reduce this time. For example, while started working with an already known computing
element, reduce the portion of test tasks, or even assign a higher level of trust for it, which can help to
balance quickly the group in the number of correctly completed tasks. Test tasks will also help
determine the computing resources of new computing element, that connects to the system. These
details can be used in order to find a better subsystem to take part into computing. In some cases,
amount of computing resources that provided by element may change even in one session. On this
case with proposed algorithm will help to detect this and will find the better group for computing, if it
is needed.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Features of the protection of distributed computing in a heterogeneous environment.</title>
      <p>To organize the protection of the chosen computing model, various approaches are proposed,
and one of them is based on the trust model [28]. Its use is appropriate for several reasons: the
system cannot manage its participants; the system does not have access to the list of the installed
software and used hardware on the side of the computing element, and as a result cannot control
the process of performing the calculation. So, the system c annot hope for a guaranteed computed
result. That is, the system does not trust any connected computing element to the system. The
trust model is based on the rating of each client, which is based on many factors, depending on
the specific implementation. Examples of such factors can be the number of correctly completed
tasks, the ratio of the number of correctly completed tasks to incorrectly completed ones, the total
time of successful work in the system, and so on. This approach allows you to solve certa in
problems and, with the appropriate configuration, provide the necessary level of protection for
both the entire system and the results of the calculation.</p>
      <p>The rating model for organizing the protection of the presented computing system is a good
practice [29] and is used in many modern tasks [30], since when using tools for controlling and
changing the rating of users in the system can solve the issue of security of distributed computing
and to a certain extent help with the effective distribution of tas ks between clients. A key solution
in the issue of computational protection is based on usage of replication approach [ 31, 32], which
is aimed at selecting number of computing elements for one task. As a result of execution, the
server or intermediate server will track the results of the calculation and, based on the result of
computing elements voting, make decisions on the correctness of the task as a whole group,
relative to each user. The obtained data must be converted into a rating, which may change
throughout the computing element work in the system. On the other hand, computing element’s
rating will allow him to be evaluated as a whole, and plan future calculations accordingly. It will
also reduce the cost of recalculation.</p>
      <p>For example, at the beginning of work, the system cooperates with computing elements, after a
some period of time, all of them received a positive assessment of their work (most of the tasks
were completed correctly), so the system make a decision to divide this group into two sma ller
groups, each of which contains  /2 computing elements, and now the system can simultaneously
perform twice as many calculations per unit of time. Another example of using the rating is the
formation of groups of computing elements with low and high ratings, in which case the trusted
client will play the role of the controller of calculations of the entire group, that is, when voting,
it will have the highest priority and, as a result, influence the result of the calculation.</p>
      <p>The use of the trust model in distributed computing issues, that considered in this paper is
appropriate, which is why it is proposed to use an additional analysis in addition to classical
calculation checks to improve the accuracy of its work. Authorization of the computing elemen t
in the system does not give us a full guarantee of his ability to correctly and quickly perform the
computing, so it is proposed to use other information that the user leaves about oneself. During
the adding to system, the server can record data about the user's address, a unique identifier of the
hardware and its features, language, connection time, average working session time, etc. The data
set may vary depending on the technology stack used in designing of the computing system.</p>
      <p>Behavioral features of the computing element – a set of data about the user that characterize
his work during the calculations. The main idea of using such a characteristic is to constantly
record information about the user's activity in the system, taking into account his resul ts in voting
(Fig. 4.)</p>
      <p>Voting settings will allow correctly distribute computing elements between subsystems. In
case all customers send different results, it may be advisable to break down the current group and
add them all in different subsystems. It is also needed to consider the situation when all trusted
computing elements provide one computed answer, and other elements in the subsystem another
computed answer. In this case, the trusted elements may be compromised, so the one of the
possible scenarios may be: breaking down the current group and set usual status for trusted
elements.</p>
      <p>It is also necessary to consider the situation when the computational element returns
constantly incorrect answers, which may mean the impact on it of viruses that affect the result,
thereby slowing down the entire system. In this case, it is necessary to provide mechanisms for
blocking its future participation in the system.</p>
      <p>The result of trusted</p>
      <p>element 1
The result of trusted</p>
      <p>element 2
The result of trusted</p>
      <p>element 3
The result of element 1
The result of element 2
The result of element N-1
The result of element N</p>
      <p>Voting of
trusted
elements</p>
      <p>Voting module</p>
      <p>Task sending</p>
      <p>back on
recalculating</p>
      <p>The
calculation
result is
accepted</p>
      <p>Usually, when organizing such calculations, the system forms groups of elements with one or
more trusted elements. Such clients have the highest trust rating and can significantly influence the
outcome of voting. Not only the success of the calculation, but also the rating of all elements in the
current iteration of calculations will depend on the result of the vote. Therefore, it is advisable to
include three or more trusted clients in the groups so that they first vote among themselves on their
calculations, and then consider the results of other users.</p>
      <p>Figure 5 shows an abstract computational module, it consists of a voting module that will evaluate
the obtained results, a module for storing performed calculations that will be used to add new
computing elements, and a computational planning module, the main task of which will be to plan the
number of cycles required to perform one task, which will depend on the current state of the
computing resources of the entire subsystem.</p>
      <sec id="sec-5-1">
        <title>Calculation planning module</title>
        <p>Computing module</p>
        <p>The proposed methods and tools will help to solve the issue of protection of needed computing
tasks, considering that the system will work with dynamic topology. Basic algorithms for adding
elements in computing groups will help to balance the system, because in one hand new element in
an already working group will not be able to significantly affect the results of computing with
elements with a good trust level, and in another hand the existing elements can either use its
computing resources or exclude it from the system by voting. Thus, the described measures will be
able to ensure the correct implementation of the tasks for the detection of malware.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Experimental research</title>
      <p>Presented methods for organizing distributed malware detection provide fault-tolerant working.
As part of this work, detection is considered in a limited form, and needs more detail. The sandbox
is currently under active development and records changes in its state due to the formation of hash
values of all registers. In further work, it is planned to transfer the right to decide on the anomaly of
the set of commands to an intermediate server, which will collect the hash values of all computing
elements in its subsystem. The voting system at this stage of the system's operation does not
consider the rating of computational elements, the decision is made on the basis of most of the
answers received are true or false. This aspect requires detailed research defining an algorithm for
updating the rating after completing the task, and adjusting it after providing the wrong answer,
abnormal behavior, etc.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>This paper presents a model of system for malware detection, based on the use of distributed
computing technology to analyse the state of the sandbox. To identify it, it is proposed to use the
concept of the state of the sandbox and monitor its state during the execution of executable files in
them. The concept of sandbox states is considered, and ways of its use in malware detection issues
are presented. The proposed model eliminates the issue of the computational complexity of the use
of sandboxes, by using distributed computing based on heterogeneous computer systems. The main
tasks of ensuring the stability and security of calculations, considering the dynamic topology of
system, are presented it is proposed to use voting methods and a rating system. It is proposed to
consider the identification of users based on behavioural characteristics and their basic information
in order to involve them more quickly in the execution of calculations and with the provision of an
appropriate level of protection for computing inside system.</p>
    </sec>
    <sec id="sec-8">
      <title>8. References</title>
      <p>[19] J. N. Odii, J. A. C. Hampo, F. O. Nwokoma, and T. U. Onwuama, Comparative Analysis of
Malware Detection Techniques using Signature, Behavior and Heuristic, International Journal
of Computer Science and Information Security (IJCSIS) 17, no. 7 (2019) 33-50.
[20] A. Khalimov, S. Benahmed, R. Hussain, S.M.A Kazmi, A. Oracevic, F. Hussain, F. Ahmad,
CA Kerrache, Container-based sandboxes for malware analysis: A compromise worth
considering, Proceedings of the 12th IEEE/ACM International Conference on Utility and
Cloud Computing (2019) 219-227. doi: 10.1145/3344341.3368810
[21] C. Hagleitner, D. Diamantopoulos, B. Ringlein, C. Evangelinos, C. Johns, R. N. Chang, B.</p>
      <p>D'Amora, J. A. Kahle, J. Sexton, M. Johnston, E. Pyzer-Knapp, C. Ward, Heterogeneous
Computing Systems for Complex Scientific Discovery Workflows, 2021 Design, Automation
&amp; Test in Europe Conference &amp; Exhibition (2021) 13-18. doi:
10.23919/date51398.2021.9474061.
[22] Folding@Home Network Breaks the ExaFLOP Barrier In Fight Against Coronavirus, 2020.</p>
      <p>URL:
https://www.tomshardware.com/news/folding-at-home-breaks-exaflop-barrier-fightcoronavirus-covid-19
[23] N. A. Ignatev, E. R. Navruzov, Estimates of the Complexity of Detecting Types of DDOS</p>
      <p>Attacks. International Journal of Computing, 21 4 (2022) 443-449. doi: 10.47839/ijc.21.4.2779
[24] R. S., Kanavalli, A. Gupta, A. Pattanaik, S. Agarwal, Real-time DDoS Detection and
Mitigation in Software Defined Networks using Machine Learning Techniques, International
Journal of Computing, 21, 3 (2022), 353-359. doi: 10.47839/ijc.21.3.2691
[25] K. Censor-Hillel, R. Gelles, B. Haeupler, Making asynchronous distributed computations
robust to noise, Distributed Computing 32 (2019) 405-421. doi: 10.1007/s00446-018-0343-5.
[26] M. Dinitz, J.T. Fineman, S. Gilbert, C. Newport, Smoothed analysis of dynamic networks,</p>
      <p>Distributed Computing, 31 (2017) 273-287. doi: 10.1007/s00446-017-0300-8
[27] C. Lenzen, J. Rybicki, Near-optimal self-stabilising counting and firing squads. Distributed</p>
      <p>Computing 32.4 (2019) 339-360. doi: 10.1007/s00446-018-0342-6
[28] N. Ramu, P. Vijayakumar, DL Jegatha, R. Sivakumar, A novel trust model for secure group
communication in distributed computing, Journal of Organizational and End User Computing
(JOEUC) 32, no. 3 (2020). 1-14. doi: 10.4018/JOEUC.2020070101
[29] W. She, Q. Liu, Z. Tian, J.-S. Chen, B. Wang and W. Liu,, Blockchain trust model for
malicious node detection in wireless sensor networks, IEEE Access 7 (2019) 38947-38956.
doi: 10.1109/ACCESS.2019.2902811
[30] S. Guo, X. Hu, S. Guo, X. Qiu, F. Qi, Blockchain meets edge computing: A distributed and
trusted authentication system, IEEE Transactions on Industrial Informatics 16, no. 3 (2019)
1972-1983. doi: 10.1109/TII.2019.2938001
[31] PS. Almeida, C. Baquero, Scalable eventually consistent counters over unreliable networks,</p>
      <p>Distributed Computing 32, no. 1 (2017) 69-89. doi: https://doi.org/10.1007/s00446-017-0322-2
[32] S. Slimani, T. Hamrouni, F.B. Charrada, Service-oriented replication strategies for improving
quality-of-service in cloud computing: a survey, Cluster Computing 24 (2021) 361-392. doi:
10.1007/s10586-020-03108-z</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] Cyber Threat Report. Sonicwall</source>
          <year>2022</year>
          ,
          <year>2022</year>
          . URL: https://www.infopointsecurity.de/media/2022-sonicwall
          <article-title>-cyber-threat-report</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <article-title>A Technique for detection of bots which are using polymorphic code</article-title>
          ,
          <source>Computer Networks: 21st International Conference, Proceedings 21 ISSN:</source>
          <year>1865</year>
          -
          <fpage>0929</fpage>
          (
          <year>2014</year>
          ).
          <fpage>265</fpage>
          -
          <lpage>276</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          - 07941-7_
          <fpage>27</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Ö.</given-names>
            <surname>Aslan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Samet</surname>
          </string-name>
          ,
          <article-title>Investigation of Possibilities to Detect Malware Using Existing Tools</article-title>
          ,
          <source>IEEE/ACS 14th International Conference on Computer Systems and Applications</source>
          (
          <year>2017</year>
          )
          <fpage>1277</fpage>
          -
          <lpage>1284</lpage>
          . doi:
          <volume>10</volume>
          .1109/AICCSA.
          <year>2017</year>
          .
          <volume>24</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Talukder</surname>
          </string-name>
          ,
          <article-title>Tools and Techniques for Malware Detection and Analysis, arXiv preprint (</article-title>
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .48550/arXiv.
          <year>2002</year>
          .
          <volume>06819</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>X.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shan</surname>
          </string-name>
          , W. Han,
          <article-title>MaliCage, A packed malware family classification framework based on DNN and GAN</article-title>
          ,
          <source>Journal of Information Security and Applications</source>
          <volume>68</volume>
          (
          <year>2022</year>
          ). doi: https://doi.org/10.1016/j.jisa.
          <year>2022</year>
          .
          <volume>103267</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>A survey</surname>
          </string-name>
          <article-title>on machine learning-based malware detection in executable files</article-title>
          ,
          <source>Journal of Systems Architecture</source>
          <volume>112</volume>
          (
          <year>2021</year>
          ). doi: https://doi.org/10.1016/j.sysarc.
          <year>2020</year>
          .
          <volume>101861</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Raghuraman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suresh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shivshankar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chapaneri</surname>
          </string-name>
          ,
          <article-title>Static and Dynamic Malware Analysis Using Machine Learning</article-title>
          ,
          <source>First International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI Springer Singapore</source>
          (
          <year>2019</year>
          )
          <fpage>793</fpage>
          -
          <lpage>806</lpage>
          . doi: https://doi.org/10.1007/
          <fpage>978</fpage>
          -981-15-0029-9_
          <fpage>62</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          .
          <article-title>Metamorphic Viruses Detection Technique based on the the Modified Emulators</article-title>
          , ICTERI ISSN:
          <fpage>1613</fpage>
          -
          <lpage>0073</lpage>
          (
          <year>2016</year>
          )
          <fpage>375</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Talukder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Talukder</surname>
          </string-name>
          ,
          <article-title>A survey on malware detection and analysis tools</article-title>
          ,
          <source>International Journal of Network Security &amp; Its Applications (IJNSA)</source>
          Vol.
          <year>2020</year>
          (
          <year>2020</year>
          )
          <fpage>37</fpage>
          -
          <lpage>57</lpage>
          . doi:
          <volume>10</volume>
          .5121/ijnsa.
          <year>2020</year>
          .
          <volume>12203</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Savenko</surname>
          </string-name>
          , Metamorphic Viruses'
          <article-title>Detection Technique Based on the Equivalent Functional Block Search, ICTERI (</article-title>
          <year>2017</year>
          )
          <fpage>555</fpage>
          -
          <lpage>569</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Savenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicheporuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hurman</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <article-title>Dynamic signature-based malware detection technique based on API call tracing</article-title>
          , ICTERI Workshops ISSN:
          <fpage>1613</fpage>
          -
          <lpage>0073</lpage>
          (
          <year>2019</year>
          )
          <fpage>633</fpage>
          -
          <lpage>643</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <article-title>Approach for the Unknown Metamorphic Virus Detection</article-title>
          ,
          <source>Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , (
          <year>2017</year>
          )
          <fpage>71</fpage>
          -
          <lpage>76</lpage>
          . doi:
          <volume>10</volume>
          .1109/IDAACS.
          <year>2017</year>
          .8095052
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>CV</given-names>
            <surname>Liţă</surname>
          </string-name>
          et al,
          <article-title>Anti-emulation trends in modern packers: a survey on the evolution of antiemulation techniques in UPA packers</article-title>
          ,
          <source>Journal of Computer Virology and Hacking Techniques</source>
          <volume>14</volume>
          (
          <year>2018</year>
          )
          <fpage>107</fpage>
          -
          <lpage>126</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11416-017-0291-9
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>SA</given-names>
            <surname>Ebad</surname>
          </string-name>
          , et al, Measuring Software Obfuscation Quality,
          <string-name>
            <given-names>A Systematic</given-names>
            <surname>Literature</surname>
          </string-name>
          <string-name>
            <surname>Review</surname>
          </string-name>
          ,
          <source>IEEE Access</source>
          <year>2021</year>
          (
          <year>2021</year>
          )
          <fpage>99024</fpage>
          -
          <lpage>99038</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .
          <volume>3094517</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T.</given-names>
            <surname>Korkishko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Melnyk</surname>
          </string-name>
          ,
          <article-title>Cryptographic processor architectures for DES algorithm</article-title>
          ,
          <source>1999 IEEE Africon. 5th Africon Conference in Africa (Cat. No.99CH36342)</source>
          vol.
          <volume>1</volume>
          (
          <year>1999</year>
          )
          <fpage>175</fpage>
          -
          <lpage>180</lpage>
          . doi:
          <volume>10</volume>
          .1109/AFRCON.
          <year>1999</year>
          .
          <volume>820788</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Feng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <article-title>Enhancing malware analysis sandboxes with emulated user behavior</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>115</volume>
          (
          <year>2022</year>
          )
          <article-title>102613</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2022</year>
          .102613
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G. P.</given-names>
            <surname>Kachare</surname>
          </string-name>
          , G. Choudhary,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Shandilya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sihag</surname>
          </string-name>
          ,
          <article-title>Sandbox Environment for Real Time Malware Analysis of IoT Devices</article-title>
          , Computing Science, Communication and Security: Third International Conference,
          <year>COMS2 2022</year>
          (
          <year>2022</year>
          )
          <fpage>169</fpage>
          -
          <lpage>183</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -10551-7_
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.</given-names>
            <surname>Alhaidari</surname>
          </string-name>
          , NA Shaib,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alsafi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alawami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Aljindan</surname>
          </string-name>
          , Atta-ur
          <string-name>
            <surname>Rahman</surname>
          </string-name>
          , Rachid Zagrouba,
          <article-title>ZeVigilante: Detecting Zero-Day malware using machine learning and sandboxing analysis techniques</article-title>
          ,
          <source>Computational Intelligence and Neuroscience</source>
          <year>2022</year>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1155/
          <year>2022</year>
          /1615528
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>