<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>D. Denysiuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Methods for detecting software implants in corporate networks ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmytro Denysiuk</string-name>
          <email>denysiuk@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomas Sochor</string-name>
          <email>tomas.sochor@osu.cz</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Kapustian</string-name>
          <email>kapustianm@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonina</string-name>
          <email>yantonina@ukr.net</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kashtalian</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Savenko</string-name>
          <email>savenko_oleg_st@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>Instytutska str., 11, Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Prigo University</institution>
          ,
          <addr-line>Havirov</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1883</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>With innovations in the technological sphere, the development of mechanisms that allow obtaining confidential information without the proper authorization of the owner is increasing. One of such mechanisms is software implants. This type of software is very difficult to detect because it does not use specialized signatures or code obfuscation, making it difficult to detect. This paper proposes a software implant detection system based on recurrent neural networks and a classifier. The classifier is a mechanism that describes the operating behavior of the software and provides the recurrent neural network with the ability to learn. This mechanism helps to identify behavioral patterns characteristic of software implants and notify the user of the possible risk of data loss. During the experiments, it was found that in order to successfully detect a software implant that initiates the creation of additional processes, the system needs to be trained for 50 epochs. Thus, the detection efficiency is 97.50%, which indicates the possibility of using this system as an effective mechanism for detecting software implants in corporate systems. Given the results obtained, it can be recommended for use in a wide range of information systems to ensure reliable protection against potential security threats.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;malware detection</kwd>
        <kwd>distributed computing</kwd>
        <kwd>heterogenous computer systems</kwd>
        <kwd>decoys</kwd>
        <kwd>software implants</kwd>
        <kwd>deception system 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Data security is particularly important in today's world, where society and the economy are
becoming increasingly digitalized and interconnected. The growing volume of electronic
data and its strategic importance in various fields of activity necessitates a comprehensive
approach to ensuring the security, integrity and availability of this data. Modern
technological innovations, such as cloud computing, the Internet of Things (IoT) and
artificial intelligence, require stricter security measures as they open up new opportunities
for abuse and exploitation. Ensuring effective protection against potential threats requires
research into innovative methods of data protection and detection. Particular attention
should be paid to the interaction between entities that process and store data and entities
responsible for software development. Such an integrated approach may take into account
technical, organizational and legal aspects of data protection. Ensuring data security in the
modern world is a highly specialized task that requires constant improvement and
adaptation to unpredictable threats and challenges in the ever-changing digital
environment.</p>
      <p>
        SocGholish [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] – is a malicious downloader implemented in the JavaScript language that
spreads through malicious or compromised websites. It uses fake software updates, such as
web browser or Flash updates, to trick users and even social engineering tools to make the
entered requests look innocent. The malware uses various methods to redirect traffic and
spread the payload. It is noted that SocGholish uses Cobalt Strike to steal information from
victims' systems. In addition, SocGholish infection can cause other types of attacks, such as
downloading the NetSupport Remote Access Tool, Async Remote Access Tool, and, in some
cases, even ransomware.
      </p>
      <p>
        NanoCore [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] – is a remote access tool (RAT[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) that spreads via spam emails with an
attachment such as a malicious Excel XLS spreadsheet. This malicious tool interacts with
the system by receiving commands to download and execute files, visit websites, and create
a RunOnce key in the victim's registry for later storage. Its spread and interaction with the
system can cause serious consequences for computer security and data privacy on infected
systems.
      </p>
      <p>
        RogueRaticate[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] – is a malicious downloader implemented with JavaScript that spreads
through vulnerable or compromised websites using fake browser updates. The
RogueRaticate payload is represented by an HTML application file that is archived or
downloaded as a shortcut file. RogueRaticate infection leads to further attacks, such as
downloading legitimate remote access tools, such as NetSupport, using the attackers' tools.
      </p>
      <p>
        Agent Tesla[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] – is a malware designed for Windows operating systems. It can be
purchased on criminal forums as a Malware-as-a-Service[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] (MaaS). Depending on the
version purchased, it has a variety of functionalities, such as intercepting keystrokes and
screenshots, collecting saved credentials from web browsers, copying the contents of the
clipboard, invading the victim's files, and downloading other malware to the computer.
These capabilities allow the attacker to carry out various attacks and criminal activities,
gaining control over the victim's system.
      </p>
      <p>
        Fake Browser[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] – is a downloader virus that uses the JavaScript language and spreads
through malicious or compromised websites via fake browser updates. Note that Fake
Browser infection may result in additional infected actions, such as using a remote access
tool such as NetSupport. This opens up the possibility for the virus to perform various
criminal actions and further spread the malicious impact to the targeted systems.
      </p>
      <p>
        ViperSoftX[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] – is a cryptocurrency thief with multiple levels of complexity. It is usually
distributed in the form of a malicious crack for known software via torrent networks and
file sharing sites. This method of distribution often facilitates its unnoticeable penetration
and activation on the systems of users using illegal copies of the software. This opens up the
possibility for ViperSoftX to use its advanced capabilities to engage in cryptocurrency
mining, launch attacks and other malicious activities that have a major impact on infected
systems.
      </p>
      <p>
        CoinMiner[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] – are a family of cryptocurrency miners that primarily use Windows
Management Instrumentation (WMI) to distribute themselves across the network.
Additionally, they often use the standard WMI event handler to execute scripts and ensure
constant activity. However, the functionality of this malware can vary as there are different
variants within the family. CoinMiner is often distributed via spam emails or in combination
with other malware.
      </p>
      <p>
        Arechclient2[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] – is a network virus, also known as SectopRAT, with a variety of
functionalities, including the ability to bypass security systems. This malicious tool is
capable of analyzing victims' systems, stealing sensitive information such as browser data
and cryptocurrency wallets, and initiating the creation of a hidden desktop to control
browser sessions. Moreover, it is equipped with a number of features aimed at overcoming
the protection of virtual machines and emulators
      </p>
      <p>
        Gh0st[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] – is a remote administrative tool (RAT) used to control infected endpoints. By
interacting with other malicious programs, Gh0st creates a secret channel for the attacker
to communicate. This approach opens up the possibility of unauthorized control and
various attacks.
      </p>
      <p>
        Ratenjay[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] – is a remote control tool that infects a victim's system by coinciding with
other malware or during file uploads. Once infected, it activates remote command execution
and is equipped with a keylogging feature that allows the attacker to monitor keystrokes on
the victim's system. This functionality allows the attacker to gain access to confidential
information entered by the user in order to further use it for criminal purposes.
      </p>
      <p>Much of the software provided can be defined as a software implant. This indicates that
these programs are embedded in the system in order to create remote access mechanisms
and perform various functions without the user's knowledge, which can have serious
consequences for the security and confidentiality of information. Software implants differ
from other types of malware in that they are more difficult to detect, especially because they
differ slightly from standard program code. Additionally, parts of a software implant can be
embedded in normal functions of a software product, making them invisible to normal
monitoring and analysis. The importance of analyzing this feature is that implants mask
their presence by embedding themselves in the normal circulation of program code. This
ability reduces the possibility of detecting software implants and requires the development
of highly effective methods for detecting such malicious elements.</p>
      <p>Due to the unique nature of software implants, it is important that research focuses on their
identification and the development of innovative analysis tools. One area of research is to
develop a mechanism for detecting software implants in software products. A software
implant, which is a piece of code created by a developer to gain unauthorized access, is a
focus of attention in efforts to improve the security and protection of information systems.
The development of effective tools to detect these implants is defined as a step towards
improving information security and addressing potential vulnerabilities to cyberattacks.
Consideration of the mechanisms of implementation of software implants and their impact
on the functioning of software products expands the understanding of challenges in the field
of system protection and contributes to the development of strategies to counter these
threats. Analyzing the characteristics of implants is important to identify their potential
impact, which will provide more effective means of combating these new forms of attacks
on the information system. Thus, the class of malware under consideration differs from the
other classes in that it includes malware that does not reproduce or transfer on its own, but
is embedded in useful software at the stage of developing it. Therefore, it is difficult to detect
and requires the development of new and improvement of existing detection methods.
Thus, there is a need to develop methodologies for detecting software implants based on
mechanisms for analyzing the behavior of system components in order to detect software
implants at the verification stage of a software product before its implementation in the IT
infrastructure.</p>
      <p>In this paper, we propose to use a mechanism for detecting software implants based on
the analysis of the behavior of system resources relative to the expected behavior of the
program, which is set through a classifier.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Characteristics of software implants in related works</title>
      <p>The main characteristics of software implants that distinguish them from other classes of
malware are presented in modern related works:</p>
      <p>
        No code obfuscation [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Software implants differ from other types of malware in that
their code is not subject to obfuscation[
        <xref ref-type="bibr" rid="ref19 ref20">19,20</xref>
        ]. Obfuscation is the process of transforming
or hiding program code to make it difficult to understand and analyze.
      </p>
      <p>
        Lack of signatures [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Due to the fact that a software implant is actually embedded in
the software, it does not have suspicious signatures that are standardly used by antivirus
programs to detect malware. Thus, software implants successfully avoid detection by
antiviruses during scans.
      </p>
      <p>Lack of direct commands in the source code of the software implant. In this context, there
are no direct instructions that can be executed in the specified software file. This property
provides resistance to detection during visual inspection of the source code.</p>
      <p>The absence of direct connections with developers is an important feature of software
implants. They avoid direct connections with developers to avoid detection and
intervention by antivirus systems. This mechanism not only guarantees anonymity, but also
reduces the risk of compromising the developer of the software implant.</p>
      <p>
        The ability to receive commands from external software resources is a key feature of
software implants. Software implants can use external files to receive commands to execute.
For example, these commands can be encrypted using steganography techniques[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and
embedded in images. When the software implant is hosted on a web server, the image files
can be periodically updated to allow for new commands. This approach allows the software
implant to be controlled without undue detection through additional network connections.
      </p>
      <p>An important step in developing an effective malware implant detection method is the
classification stage by attack method. This classification includes ransomware, remote
access programs, programs that wait for commands, and programs that collect and transmit
information. Further study and analysis of these categories allows you to create reliable
detection methods for various types of software implants.</p>
      <p>Ransomware - is a category of software implants aimed at extorting and collecting
confidential information related to a user or system. It initiates the process of extorting this
information by using unauthorized methods to gain access and interfere with the system.
This type of implant is aimed at obtaining confidential data for further use for profit.</p>
      <p>A program waiting for the team, is a class of implants designed to execute specific
commands or instructions coming from an attacker. Its main purpose is to perform specific
tasks or attacks using the received remote commands.</p>
      <p>A program that provides remote access, is a category of implants aimed at creating
remote access points to a system. This allows attackers to perform remote operations and
manipulate system resources.</p>
      <p>Thus, the classification of software implants according to certain features and criteria is
the basis for the development of new and improvement of the known methods of their
detection.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Intrusion detection methods</title>
      <p>Software implants that have similarities to Trojan horses in their purpose pose a potential
threat to systems. In order to effectively detect and prevent their introduction and activities,
various mechanisms are used, which can be divided into detection mechanisms and
prevention mechanisms.</p>
      <p>
        The detection mechanisms include obfuscation analysis[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Obfuscation analysis is a
process of systematic study and analysis of the obfuscation techniques used in program
code. In this context, obfuscation refers to techniques aimed at making it difficult to read
and understand program code by introducing various transformations, transformations
and hiding program logic. Obfuscation analysis involves a detailed study of the obfuscation
techniques used to determine the degree of difficulty in revealing the true functionality of
the program. This process includes identifying and deciphering various obfuscation
techniques, determining the level of code complexity and its impact on the readability and
understanding of the program.
      </p>
      <p>In order to analyze and detect code obfuscation, we consider a methodology aimed at
identifying metamorphic viruses. This approach is based on a thorough study of obfuscation
features that characterize program code modifications. The focus is on identifying and
analyzing variations in the functional blocks of suspicious programs and their modified
versions. This strategy is aimed at identifying certain obfuscation patterns that are
characteristic of metamorphic viruses and allows to increase the efficiency of the process of
detecting such threats. Therefore, an important step in the process of detecting a software
implant in software is to systematically check the program code to identify the presence of
obfuscation patterns. This stage of analysis is aimed at identifying changes made to the code
by the implant that may hide its existence or complicate the detection of malicious actions.
The emphasis is placed on identifying characteristic obfuscation patterns and analyzing
them to effectively detect potentially malicious modifications in the program code.</p>
      <p>
        One approach to malware detection within distributed systems with partial
centralization[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. This method involves the use of distributed systems operating with
partial centralization, which include decentralized subsystems where decisions on malware
detection are made by a centralized management body. To determine the presence of
malware in the system components, characteristic indicators have been established, and
generalized analytical expressions for their calculation have been developed. These
analytical expressions make it possible to assess the state of system components and make
appropriate decisions to optimize the malware detection process.
      </p>
      <p>Detection mechanisms include an expanded range of technical and analytical tools
designed to detect and analyze software implants. These mechanisms are based on a
thorough analysis of program code, detection of anomalies during program execution,
monitoring of system resources, security audits, and the use of static and dynamic analysis
to identify potentially harmful elements. Additionally, detection mechanisms include
measures aimed at protecting against code modification, detecting illegal connections to the
developer, and effectively monitoring and analyzing the interaction of the program with
system resources. The interaction of these mechanisms helps to detect software implants
and provides a high level of protection of information systems from potential threats.</p>
      <p>Prevention mechanisms include a variety of technical and organizational strategies
designed to make it impossible to introduce and effectively control software implants.
These mechanisms are focused on detecting and deviating from standard behavior that may
indicate the presence of malicious program code.</p>
      <p>
        Prevention systems include the effective implementation of intrusion detection systems
(IDS[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]) to respond to anomalies in network traffic in a timely manner. In addition, it is
important to implement and configure mechanisms for tracking program behavior that
allow you to actively recognize abnormal changes and activities in the program code and
operating system. For the proper functioning of IDSs, an important step is a detailed
analysis of their work, which can be presented in the form of a scheme, as shown in Fig. 2.
2. This scheme allows the intrusion detection system to effectively analyze network traffic,
detect abnormal patterns, and take appropriate measures to prevent further incidents. The
approach of using intrusive detection systems and mechanisms for tracking program
behavior provides comprehensive protection of information systems from potential
threats, ensuring the detection and neutralization of possible intrusions.
      </p>
      <p>
        Anomaly Behavior Detection (ABD) systems[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] are a tool for detecting deviations in the
behavior of a system or user from a predictable pattern. They are used in a variety of areas,
including intrusion detection, fraud prevention, defect detection, system performance
monitoring, event detection in network sensors, and ecosystem disruption response.
      </p>
      <p>ABD systems fall into two main categories:
1. Misuse Detection Systems (MDS): These systems respond to known attacks using
signatures and patterns of behavior that have previously been classified as abuse.
2. Anomaly Detection Systems (ADS): These systems record deviations from the
normal development of a system, not necessarily predefined. They detect unusual
patterns or anomalies that may indicate potential threats.</p>
      <p>An essential characteristic of ABD systems is their ability to handle attacks even when
the attacker has already gone through the authentication and authorization process and the
formal access rights correspond to his or her authority. This makes it possible to detect
anomalies that occur during legitimate operations but deviate from the typical context of
behavior. The structure of the process with the depicted scheme is shown in Fig. 3. This
scheme demonstrates the operation of the anomaly detection system algorithm, where each
block corresponds to a specific stage of analysis and decision-making. Such an anomaly
detection system allows to effectively identify unforeseen deviations in behavior, enhancing
the overall level of protection of information systems from potential threats and attacks.</p>
      <p>Thus, there is a need to develop a system for detecting software implants in order to
improve the effectiveness of information system protection. This initiative is driven by the
growth of threats and the emergence of new methods of attacking the digital environment.
The development of such a system is determined by the need to reliably detect and analyze
software implants that are difficult to detect and differ from regular program code. The
creation of this system involves consideration of innovative methods aimed at effectively
detecting and protecting against potential digital security threats, ensuring reliable control
over digital Front matter.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Method for detecting software implants using a decoy system</title>
      <p>A decoy method can be used to detect software implants. This system will emulate the
operation of the subsystem, simultaneously analyzing requests to program files, network
requests from the program, and process interaction. It will also perform the functions of
creating, running, restarting and monitoring data that is loaded into the system's memory.
The described decoy system is defined by its ability to emulate the behavior of a typical
object that can be targeted by software implants. It performs the functions of analyzing and
observing actions that may indicate a potential threat or inappropriate interference in the
system. The work of the algorithm is shown in Fig. 4. This diagram allows you to understand
in detail the sequence of operations performed by the decoy system to detect possible
software implants.</p>
      <p>Since a software implant is a piece of code that is virtually indistinguishable from regular
code, its effective detection requires that the initial settings be determined using a system
configurator. This configurator is a tool that includes a set of patterns that characterize a
given software product. These patterns combine information about the program's
interaction with resources, a description of TCP/IP, the interaction of processes performed
by the software, and the structure of the RAM used by the software.</p>
      <p>The system configurator acts as a system tool, setting the parameters and characteristics
of the software in accordance with the specified patterns. This process provides the
algorithm with the ability to detect and respond to abnormal parameters in the software
operation. Due to the difficulties of detecting software implants, the use of a system
configurator becomes a necessary element for customizing the detection system. This
allows the system to be adapted to different types of software, providing the ability to
effectively respond to a variety of implant threats.</p>
      <p>Network request analysis includes a network traffic scanning mechanism that actively
evaluates whether the software generates additional requests to third-party resources,
taking into account the resources that were described in the configurator. To effectively
detect software implants, the system analyzes the frequency of requests, their number, and
the length of packets in each request. Additionally, the system checks the content of
requests that were not specified in the configurator. This makes it possible to determine
whether incoming requests contain external commands and whether outgoing requests
contain confidential information.</p>
      <p>
        To analyze data in network queries, a recurrent neural network (RNN) is used[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Due
to the characteristics of recurrent neural networks, traffic analysis and anomaly detection
in the network data stream are efficient. These features of recurrent neural networks
contribute to more accurate and sensitive detection of anomalous data in network traffic,
which makes this method important for identifying potential threats and inconsistencies in
network behavior. The principle of operation of the network query analysis mechanism is
shown in Fig. 5.
      </p>
      <p>
        To improve the efficiency of detecting software implants aimed at creating botnet
networks, a multi-agent approach in computer systems can be applied [
        <xref ref-type="bibr" rid="ref21 ref22 ref23">21-23</xref>
        ]. This
approach can serve as an additional stage of system analysis. The multi-agent approach to
detecting botnets in computer systems is a methodology based on the concept of
multiagent systems to detect and counteract botnets. A botnet is defined as a network of
computers or other devices that are controlled by an attacker and used to perform various
tasks, such as spreading malware or attacking other systems. The multi-agent approach
involves the use of autonomous agents that act independently and interact with each other
to detect and counter botnets. Each agent can perform its own functions and tasks, such as
analyzing network traffic, detecting anomalies, or analyzing the characteristics of the
attacks used. This approach is aimed at improving systems for detecting and responding to
threats posed by botnets, providing a more efficient and adaptive mechanism for protecting
computer systems.
      </p>
      <p>The next stage of detecting software implants is carried out by monitoring the processes
generated by the software. This mechanism operates with a table of allowed processes and
procedures to determine the occurrence of anomalies in processes. It includes a task
manager for active software and a mechanism for detecting new resources. When a new
process is detected, the system stops its operation and checks whether it can be re-created.
If the process is restored, the system displays a message about the probability of the
presence of a software implant that initiates the restoration of processes. The application
of this method is based on the study and analysis of process dynamics, relying on the
principles of monitoring and analyzing changes in system resources to timely detect and
counteract cases of creating unforeseen processes. The operation of the system for
detecting abnormal processes is shown in Fig. 6.</p>
      <p>
        This algorithm performs a number of key functions. First, it checks whether the process
belongs to the list of configured processes. Next, it checks the classification of the process
and analyzes the resources it uses. A recurrent neural network (RNN[
        <xref ref-type="bibr" rid="ref24 ref25">24-25</xref>
        ]) is used to
assess possible threats. If the process is suspicious, the system tries to stop its operation. If
the suspicious process is repeated, the system generates information about its potential
danger to the system. This approach is based on the use of scientific methods and takes into
account aspects of process behavior analysis in order to effectively identify and eliminate
possible threats.
      </p>
      <p>The algorithm for analyzing used resources and RAM content operates in accordance
with the principles used in the algorithm for analyzing network requests. When analyzing
the contents of the RAM, the system compares the declared amount of allocated memory
described in the classifier with the actual amount of memory allocated. As for the analysis
of used resources, the system examines which files are used in the program and how they
are used. For example, if it is found that a file that is not intended to read data in binary
format at all, such as an image, is processed as a binary file, this may indicate an attempt to
manipulate the system through file input.</p>
      <p>Thus, the described method can be implemented and the detection strategy set by the
steps of this method is promising for further research.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experiment</title>
      <p>Setting up the experiment. The experiment involves the use of the developed system,
which implements the method of detecting software implants. The conditions of the
experiment were clearly defined. It is noted that the application of this method is possible
in the corporate environment, since it is in corporate information systems that software
implants can mainly occur. The experiment involved software implants aimed at various
tasks:
● Collecting information and transferring it to the server.
● The implant waiting for the command is hidden in the image using steganography.
● A program that provided access to the system console.
● Implants designed to create fake accounts.</p>
      <p>For the experiment, a recurrent neural network was used to classify software implants
depending on their functionality:
1. Interaction with the network.
2. Operations with files.
3. Process management.
4. Execute commands from the command line.</p>
      <p>The object for classification was a system specially designed for warehouse
management. The classifier included characteristics related to the types of files that the
software product processed, as well as a detailed description of the operations that
could be performed on the files. The servers to which the program made requests and
the console operations available to the software implant were also identified.</p>
      <p>To objectively evaluate the algorithm, more than 3,000 different operations were
performed during the experiment, including 400 operations that were specific to
software implants. This had a positive impact on the quality of classification of software
implants and allowed for a deeper understanding of their functional purpose within the
experiment.</p>
      <p>Results of experimental studies. To perform the experiment, an isolated system and
a system that simulated user actions were used. In order to effectively train the
recurrent neural network and correctly classify software implants, it was planned to
spend 50 epochs training the model.</p>
      <p>The results of the experiment are presented in Table 1, which shows the data for
every 10 epochs. This allowed us to obtain detailed data on the detection and
classification of software implants during the experiment. The results of the experiment
are shown in Table 1.</p>
      <p>During the experiment, it was found that the network was effectively trained for 50
epochs. It was noted that the network demonstrated the highest efficiency when
detecting software implants that initiate additional processes.</p>
      <p>The overall efficiency of detecting software implants that create additional processes
was 98.00%. The training schedule of the software implant detection system is shown
in Fig. 7.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>As a result of the study, a software implant detection system based on recurrent neural
networks and a classifier was developed. The classifier is a mechanism that describes the
operating behavior of the software and provides the recurrent neural network with the
ability to learn. This mechanism helps to identify behavioral patterns characteristic of
software implants and notify the user of the possible risk of data loss.</p>
      <p>During the experiments, it was found that in order to successfully detect a software
implant that initiates the creation of additional processes, the system needs to be trained
for 50 epochs. Thus, the detection efficiency is 97.50%, which indicates the possibility of
using this system as an effective mechanism for detecting software implants in corporate
systems. Given the results obtained, it can be recommended for use in a wide range of
information systems to ensure reliable protection against potential security threats.</p>
      <p>Further research work is aimed at creating automatic classification systems designed to
automate the process of setting up a software implant detection system. This will help
reduce the time required to configure and put into operation a system designed to detect
software implants in various types of software and information systems.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[1] Top 10 Malware Q3</source>
          ,
          <year>2023</year>
          . URL: https://www.cisecurity.org/insights/blog/top-10
          <string-name>
            <surname>-</surname>
          </string-name>
          malware-q3
          <article-title>-2023</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Poudyal</surname>
          </string-name>
          , D. Dasgupta,
          <article-title>AI-powered ransomware detection framework</article-title>
          ,
          <source>IEEE Symposium Series on Computational Intelligence (SSCI)</source>
          .
          <article-title>(</article-title>
          <year>2020</year>
          )
          <fpage>1154</fpage>
          -
          <lpage>1161</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Valeros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <article-title>Growth and commoditization of remote access Trojans</article-title>
          ,
          <source>IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</source>
          .
          <article-title>(</article-title>
          <year>2020</year>
          )
          <fpage>454</fpage>
          -
          <lpage>462</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ude</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Swar</surname>
          </string-name>
          ,
          <article-title>Securing Remote Access Networks using malware detection tools for industrial control systems</article-title>
          .
          <source>4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS)</source>
          .
          <article-title>(</article-title>
          <year>2021</year>
          )
          <fpage>166</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Enterprise</given-names>
            <surname>Cybersecurity</surname>
          </string-name>
          <string-name>
            <given-names>Solutions</given-names>
            , Services &amp; Training |
            <surname>Proofpoint</surname>
          </string-name>
          <string-name>
            <surname>US</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://www.proofpoint.com/us/blog/threat-insight/
          <article-title>are-you-sure-your-browser-datecurrent-landscape-fake-browser-updates</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.F.M.</given-names>
            <surname>Karo-Karo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.S.A.</given-names>
            <surname>Harumnanda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <article-title>Investigating Multiple Malware as a Service (MaaS): Analysis and Prevention Techniques</article-title>
          . IEEE International Conference on Cryptography, Informatics, and
          <string-name>
            <surname>Cybersecurity (ICoCICs).</surname>
          </string-name>
          (
          <year>2023</year>
          )
          <fpage>270</fpage>
          -
          <lpage>274</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shuang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lie</surname>
          </string-name>
          , vWitness:
          <source>Certifying Web Page Interactions with Computer Vision</source>
          , 53rd
          <source>Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>431</fpage>
          -
          <lpage>444</lpage>
          . URL: https://security.csl.toronto.edu/blog/wppublications/hshuangdsn2023vwitness
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Sudhakar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>An emerging threat Fileless malware: a survey and research challenges</article-title>
          .
          <source>Cybersecurity</source>
          , vol.
          <volume>3</volume>
          (
          <issue>2020</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9] MalwareBazaar | Browse Checking your browser,
          <year>2024</year>
          . URL: https://bazaar.abuse.ch/browse/tag/Arechclient2/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Gai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>ER-ERT: A Method of Ensemble Representation Learning of Encrypted RAT Traffic</article-title>
          .
          <source>2023 IFIP Networking Conference (IFIP Networking)</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ježovnik</surname>
          </string-name>
          , ,
          <article-title>Glasovne in naglasne značilnosi terskega narečja</article-title>
          .
          <source>Založba ZRC</source>
          , vol.
          <volume>43</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zafar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.U.</given-names>
            <surname>Sarwar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Salem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.Z.</given-names>
            <surname>Malik</surname>
          </string-name>
          ,
          <article-title>Language and obfuscation oblivious source code authorship attribution</article-title>
          .
          <source>IEEE Access</source>
          (
          <year>2020</year>
          ) vol.
          <volume>8</volume>
          ,
          <fpage>197581</fpage>
          -
          <lpage>197596</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Acharya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chaudhary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chhabria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jangale</surname>
          </string-name>
          ,
          <article-title>Detecting malware, malicious URLs and virus using machine learning and signature matching</article-title>
          .
          <source>2021 2nd International Conference for Emerging Technology (INCET)</source>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Denysiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Savenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashtalian</surname>
          </string-name>
          ,
          <source>Method for Detecting Steganographic Changes in Images Using Machine Learning</source>
          ,
          <source>2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Athens, Greece, (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/DESSERT61349.
          <year>2023</year>
          .
          <volume>10416453</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eskandari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.H.</given-names>
            <surname>Janjua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vecchio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Antonelli</surname>
          </string-name>
          ,
          <string-name>
            <surname>Passban</surname>
            <given-names>IDS</given-names>
          </string-name>
          :
          <article-title>An intelligent anomalybased intrusion detection system for IoT edge devices</article-title>
          .
          <source>IEEE Internet of Things Journal</source>
          , (
          <year>2020</year>
          ) vol.
          <volume>7</volume>
          ,
          <fpage>6882</fpage>
          -
          <lpage>6897</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Dong, Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection</article-title>
          .
          <source>Future Generation Computer Systems</source>
          , (
          <year>2021</year>
          ) vol.
          <volume>122</volume>
          ,
          <fpage>130</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qian</surname>
          </string-name>
          , H. Liu,
          <string-name>
            <given-names>K.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <article-title>Optimized graph convolution recurrent neural network for traffic prediction</article-title>
          .
          <source>IEEE Transactions on Intelligent Transportation Systems</source>
          (
          <year>2020</year>
          ) vol.
          <volume>22</volume>
          ,
          <fpage>1138</fpage>
          -
          <lpage>1149</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashtalian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <source>Malware Detection By Distributed Systems with Partial Centralization</source>
          ,
          <source>2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</source>
          , Dortmund, Germany,
          <year>2023</year>
          pp.
          <fpage>265</fpage>
          -
          <lpage>270</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Albouq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Abi Sen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Namoun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.M.</given-names>
            <surname>Bahbouh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.B.</given-names>
            <surname>Alkhodre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alshanqiti</surname>
          </string-name>
          ,
          <article-title>A double obfuscation approach for protecting the privacy of IoT location based applications</article-title>
          .
          <source>IEEE Access</source>
          (
          <year>2020</year>
          ) vol.
          <volume>8</volume>
          ,
          <fpage>129415</fpage>
          -
          <lpage>129431</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>G.</given-names>
            <surname>Markowsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Nicheporuk</surname>
          </string-name>
          <article-title>The technique for metamorphic viruses' detection based on its obfuscation features analysis</article-title>
          ,
          <source>CEUR-WS</source>
          ,
          <volume>2104</volume>
          (
          <year>2018</year>
          )
          <fpage>680</fpage>
          -
          <lpage>687</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tesnim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Farah</surname>
          </string-name>
          ,
          <article-title>A multi-agent-based system for intrusion detection</article-title>
          .
          <source>Agents and MultiAgent Systems: Technologies and Applications 2021: Proceedings of 15th KES International Conference, KES-AMSTA</source>
          <year>2021</year>
          ,
          <year>June 2021</year>
          (
          <year>2021</year>
          )
          <fpage>177</fpage>
          -
          <lpage>191</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>C.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shanmugam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Azam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Karim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zamani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kavianpour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.B.</given-names>
            <surname>Idris</surname>
          </string-name>
          ,
          <article-title>Intrusion detection system for the internet of things based on blockchain and multi-agent systems</article-title>
          .
          <source>Electronics</source>
          (
          <year>2020</year>
          ) vol.
          <volume>9</volume>
          ,
          <fpage>1120</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.R.</given-names>
            <surname>Zahra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Chishti</surname>
          </string-name>
          ,
          <article-title>A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach</article-title>
          .
          <source>Neural Computing and Applications</source>
          (
          <year>2022</year>
          ) vol.
          <volume>34</volume>
          ,
          <fpage>6927</fpage>
          -
          <lpage>6952</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tsantekidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Passalis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tefas</surname>
          </string-name>
          ,
          <article-title>Recurrent neural networks. Deep learning for robot perception and cognition</article-title>
          ,
          <source>Elsevier</source>
          (
          <year>2022</year>
          )
          <fpage>101</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ruiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <article-title>Gated graph recurrent neural networks</article-title>
          .
          <source>IEEE Transactions on Signal Processing</source>
          (
          <year>2020</year>
          ) vol.
          <volume>68</volume>
          ,
          <fpage>6303</fpage>
          -
          <lpage>6318</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>