<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>D. Denysiuk);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Detecting software implants using system decoys⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmytro Denysiuk</string-name>
          <email>denysiuk@khmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Savenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergii Lysenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Savenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>Institutska str., 11, Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This paper presents a new method for detecting software implants based on the use of software decoys and in-depth analysis of system parameters. The aim of the study was to compare the effectiveness of the proposed method with existing approaches, such as signature analysis, behavioral analysis, and machine learning-based methods. For this purpose, a relevant dataset was collected, including 5000 malware samples and 5000 legitimate programs. Each sample was analyzed for detailed signs of interaction with the file system, RAM, process behavior, and network activity. The research methodology included data collection and labeling, feature extraction and normalization, and the use of recurrent neural networks (RNNs) to analyze complex behavioral patterns. The proposed method used software decoys to attract malware, which allowed detecting its activity at early stages. Experiments showed that the method achieves 95% accuracy, 94% completeness, 96% prediction accuracy, and 95% F1-measure, which significantly exceeds the performance of signature analysis (85% accuracy), behavioral analysis (89% accuracy), and machine learning methods (91% accuracy). The proposed approach has several key advantages: the active use of software decoys increases the likelihood of detecting threats, in-depth analysis of system parameters provides a comprehensive overview of program behavior, and the use of RNNs allows recognizing complex and unknown patterns. In addition, the method demonstrates a high detection rate, which makes it suitable for use in real-time systems. The results of the study indicate the high potential of the proposed method for improving the cybersecurity of modern information systems. The method can be integrated into existing protection systems, such as intrusion detection systems (IDS) and SIEM systems, providing a more efficient and prompt response to cyber threats. In future research, it is planned to expand the dataset and optimize the model to reduce computational costs, as well as conduct testing in real-world environments to assess the practical effectiveness of the method. Thus, the proposed method represents a significant step forward in the field of software implant detection, providing high accuracy, completeness and speed of detection, which is critical for protecting information systems from modern and evolving cyber threats.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;malware detection</kwd>
        <kwd>software implants</kwd>
        <kwd>software decoys</kwd>
        <kwd>behavioral analysis</kwd>
        <kwd>machine learning</kwd>
        <kwd>deep learning</kwd>
        <kwd>recurrent neural networks</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>intrusion detection systems (IDS)</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The proliferation of software implants [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], such as malware, rootkits[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and backdoors[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], poses a
significant threat to the information security of modern computer systems. These malicious
components hidden in software are capable of unauthorized access to system resources, stealing
confidential information, and compromising data integrity. The increasing complexity and
sophistication of software implants makes them difficult to detect using traditional methods based
on signature analysis or simple anomaly detection.
      </p>
      <p>
        A software implant is a malicious code [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] or module that is secretly installed on computer
systems or devices to gain unauthorized access, collect confidential information, or perform other
destructive actions without the user's knowledge. They are often used as part of sophisticated
cyberattacks, such as advanced persistent threats (APTs) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], providing long-term covert access to
compromised systems.
      </p>
      <p>
        Software implants can be introduced into a system through various methods, including
exploitation of vulnerabilities [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] in software, social engineering, or infected updates. They are able
to operate undetected for a long time, carrying out malicious operations without detection, which is
a particular danger for organizations, as it can lead to significant financial losses, loss of reputation,
and leakage of confidential information.
      </p>
      <p>One of the key challenges in detecting software implants is their ability to bypass security
controls. Modern implants can use stealth techniques, such as rootkits, which modify the operating
system kernel or inject code into legitimate processes. This allows them to evade detection by
antivirus programs and other security tools that rely on checking known signatures or detecting
abnormal behavior.</p>
      <p>
        Additionally, the development of obfuscation [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and polymorphism [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] techniques allows
malware to change its code or behavior, making it difficult to detect [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] even with advanced
analyzers. This underscores the need to develop new methods that are independent of prior
knowledge of malware and can effectively respond to new threats.
      </p>
      <p>
        One of the most promising areas in the fight against software implants is the use of system
decoys[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] that act as traps for malware. System decoys can be implemented in the form of specially
created files, processes, or network services that imitate vulnerable or attractive objects for attackers.
When malware interacts with such decoys, its presence is detected and the threat is neutralized.
      </p>
      <p>
        Compared to traditional methods, the use of system decoys has several advantages. First, these
tools do not rely on known signatures[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] or malware behavioral patterns, making them effective
against new or modified threats. Secondly, decoys can be integrated at different levels of a system,
providing multi-level protection. Thirdly, interaction with the decoy can help collect additional
information about the malware, allowing for more detailed analysis and development of
countermeasures.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Overview of existing solutions</title>
      <p>
        Honeypot systems continue to play an important role in ensuring the cybersecurity of modern
computer networks. They function as specialized tools that simulate[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] real systems or services in
order to attract attackers, allowing cybersecurity professionals to investigate their methods and
techniques in detail. Between 2021 and 2024, there have been significant advances in the
development of honeypot architectures and related software, including integration with artificial
intelligence[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and machine learning[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] technologies to improve threat detection and analysis.
These systems not only help identify potential threats, but also provide in-depth analysis of
attackers' actions in various environments, including cloud computing, the Internet of Things (IoT),
industrial cyber-physical systems (CPS)[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], and traditional network infrastructures. In addition,
the improvement of honeypot systems contributes to the formation of more adaptive and proactive
cyber defense strategies, which is important in the context of the growing complexity and scale of
modern cyber threats.
      </p>
      <sec id="sec-2-1">
        <title>2.1. Main categories of honeypot systems</title>
        <p>Honeypot systems are divided into two main types depending on the level of interaction: low
interaction and high interaction. Low-interaction systems, such as Honey, are limited to emulating
a limited set of services. They involve only basic attack attempts such as port scans or entry-level
exploits. Although these systems are less resource-intensive, they are not capable of investigating
sophisticated attack methods in detail. In contrast, highly interoperable systems, such as Dionaea or
Kippo, offer attackers full operating systems or real services to interact with. This allows attackers
to perform more complex operations while remaining isolated from critical systems. Thanks to this,
experts can get more information about the penetration methods used by cybercriminals. T-Pot, for
example, is a comprehensive platform that integrates several honeypot solutions and provides
indepth real-time analysis. The system has been active in recent years and has received updates aimed
at improving performance and monitoring capabilities.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Honeynet systems</title>
        <p>
          Honeynet systems[
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] consist of several honeypot services, which allows you to simulate an entire
network infrastructure, including servers, databases, and other important elements of corporate
systems. One important example of a modern honeynet architecture is HoneyFactory, which uses
container technologies to create virtual environments. This solution provides fast deployment of
complex network systems and enhances attack detection capabilities through the use of cyber
detection. Compared to previous versions of honeynet, HoneyFactory shows better results in terms
of protection efficiency due to the high speed of request processing and flexible system settings for
different business needs.
        </p>
        <p>
          The use of honeynet systems has become popular in various environments, including IoT and
CPS. These technologies allow you to protect not only traditional network environments, but also
new-generation infrastructures, where it is important to monitor both internal and external threats.
Recent studies have emphasized the importance of integrating such systems into critical
infrastructure to obtain enhanced information about attack methods and their prevention.
2.3. Honeytoken, Honeypatch та Honeyclient
In addition to honeypot systems, other decoys are being actively developed that perform additional
functions in threat detection. Honeytoken[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] is one of the most common tools for detecting
unauthorized activities on the network. Programs such as Canarytokens allow you to create decoy files
that automatically generate alerts when they are accessed. For example, a file that looks like an important
document can be a signal to detect cybercriminals trying to read or modify it.
        </p>
        <p>Honeypatch, introduced in 2023, is an innovative technology that allows you to test the security
of systems without risking productive environments. It creates vulnerable components that attackers
can attack, allowing you to study their behavior and find new threats. This method is effectively
used to collect information about attacks and to test the readiness of systems to exploit
vulnerabilities.</p>
        <p>Honeyclient systems, such as Capture-HPC, are used to detect threats targeting client
applications. They actively interact with potentially malicious websites and analyze the methods
used to infect client applications. This technology allows you to effectively simulate real user
behavior and detect attacks such as drive-by downloads.</p>
        <p>Thus, the development of malware detection systems using decoys is a promising and highly
sought-after area. The use of such technologies allows not only to detect and analyze modern cyber
threats more effectively, but also to predict possible attacks, increasing the overall level of security
of information systems. Further development and implementation of decoy software will help create
more adaptive and proactive protection strategies, which is important in the context of the
everincreasing complexity and dynamics of malware.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Detection of software implants</title>
      <p>Successful development of a malware decoy detection model requires an in-depth analysis of the
parameters that the system will monitor. Identifying these parameters is key to effectively detecting
and analyzing malicious activity on the system. The main aspects that need to be considered in detail
include file system interaction, changes in RAM usage, process behavior, and network activity.
Understanding the behavioral patterns typical of software implants is critical to developing an
effective model.</p>
      <p>Successful development of a malware decoy detection model requires an in-depth analysis of the
parameters that the system will monitor. Identifying these parameters is key to effectively detecting
and analyzing malicious activity on the system. The main aspects that need to be considered in detail
include file system interaction, changes in RAM usage, process behavior, and network activity.
Understanding the behavioral patterns typical of software implants is critical to developing an
effective model.</p>
      <p>Analyzing such patterns includes tracking the frequency and types of file operations, monitoring
changes in directory structure, and detecting unusual or suspicious changes in file sizes. To quantify
anomalies in the file system, you can use the anomaly indicator   :
  =

 =1
  ∙
  −  
 
,
  − frequency of the operation  ′;
the system;
  − weighting factor for the operation  ;</p>
      <p>and   − average value and standard deviation of the frequency  in the normal state of
It is especially important to pay attention to operations with system files, configuration files, and
the registry, as changes to them may indicate attempts to compromise the system.</p>
      <p>Changes in the operation of RAM are another significant indicator of a potential threat. Software
implants can load their code directly into memory, bypassing the file system, or inject it into the
memory of other processes, making them difficult to detect using traditional methods. Analysis of
memory usage patterns includes monitoring the creation of new memory segments, changes in
access rights to them, and analyzing the contents of memory for malicious signatures or abnormal</p>
      <p>To quantify changes in memory usage, you can consider the rate of change in the amount of
  

where   − the amount of memory used at a given time . If the value ∆
exceeds the threshold
, this may indicate abnormal activity. For example, the detection of executable code in
memory areas that usually do not contain such code can be described through the indicator function
If</p>
      <p>( ) = 1 for the region  , where the executable code is not expected, this may indicate a
software implantation.
security features.</p>
      <p>The behavior of processes in a system also provides important information for detecting malicious
activity. Software implants can create new processes, modify existing ones, or interact with them in
unusual ways. They may try to gain elevated privileges, change system settings, disable or bypass

1,  
  
  
 ℎ</p>
      <p>= ( 1,  2,  3, … ,   ) − a vector of features related to the behavior of the process;
Analysis of process behavior patterns includes monitoring the creation and completion of
processes, analyzing their interaction, tracking system calls, and resource usage. Logistic regression
can be used to estimate the probability that a process is malicious:</p>
      <p>− model coefficients.</p>
      <p>For example, a process that unexpectedly makes a large number of system calls related to network
activity or file manipulation may have high values for the following attributes  , which will increase
the likelihood of  (</p>
      <p>|  ). In addition, you should pay attention to processes that run in the
background without user interaction or try to hide their presence by changing their attributes.</p>
      <p>Network activity of software implants is often one of the most obvious indicators of their
presence. They may attempt to establish unauthorized connections to remote servers to transmit
collected data, receive commands, or download additional modules. Analysis of network behavior
patterns includes tracking the initiation of network connections, analyzing the protocols, ports, and
IP addresses used. To quantify anomalies in network activity, you can use the anomaly indicator   :
  =

 =1
  ∙
  −  
 
2
,
calculating hidden states ℎ by the formula:</p>
      <p>For example, suddenly establishing connections to geographically remote or suspicious
addresses, using non-standard or high ports, bypassing proxy servers or firewalls can indicate
malicious activity. It's also important to analyze the volume and nature of the data being transmitted,
including whether confidential information or large amounts of data are being transmitted for no
apparent reason.</p>
      <p>
        For in-depth analysis of these patterns, it is necessary to use modern machine learning and
artificial intelligence methods. Deep learning algorithms, such as recurrent neural networks
(RNNs)[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] or convolutional neural networks (CNNs)[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], can be used to analyze sequences of
actions and identify complex dependencies between different system parameters.
      </p>
      <p>For example, a recurrent neural network models a sequence of input data { 1,  2,  3, … ,   } by
  ℎ,  ℎℎ − weight matrices;
 ℎ − displacement vector;
 − activation function ReLU;
Network output   can be calculated as:
 ℎ − output weight matrix;
  − displacement vector.</p>
      <p>
        =  ℎ ℎ +  
(5)
(6)
(7)
  − measure parameter value  (for example, the number of connections to a specific IP
address);
  − weighting factor;
  and   − the average value and standard deviation of this parameter in the normal state;
ℎ =    ℎ  +  ℎℎℎ −1 +  ℎ ,
communication between malware and command-and-control[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] servers that can be disguised as
legitimate traffic. In addition, it is important to consider contextual factors and profiles of normal
system behavior. The use of behavioral analysis allows the model to detect deviations from the norm
that may not be obvious when considering individual parameters. The Mahalanobis distance can be
used to quantify the deviation[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]:
 
=
( −  )  −1( −  )
(8)
•  − is the covariance matrix.
•  − vector of sporasterzhuvannye signs;
•  − is a vector of average values of features in the normal state;
      </p>
      <p>
        For example, a program that does not perform network activity under normal conditions but
suddenly starts sending data to the network[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] may have a significant   deviation, indicating an
anomaly. Temporal aspects, such as the time of day when certain activities occur or the duration of
sessions, should also be considered, which can help identify anomalies.
      </p>
      <p>Software implants often use sophisticated techniques to bypass detection tools, such as
polymorphism, metamorphism, code obfuscation, rootkits, and other concealment methods.
Therefore, the model must be able to detect not only known signatures or patterns, but also new,
previously unknown threats. This can be achieved by using unsupervised learning and clustering
methods. One of them, the k-means algorithm[24], allows you to divide data into k clusters by
minimizing the sum of squares of the distances between points and cluster centroids:
    

 =1
  ∈ 
‖  −   ‖
2
(9)
•   − cluster ′;
•   − cluster centroid  ;</p>
      <p>Identifying new behavioral clusters can signal the emergence of new malicious patterns.
Integration of the model with existing security and monitoring tools is an important component that
provides an expanded picture of the system state and facilitates rapid response to threats. For
example, integration with intrusion detection systems (IDS)[25], event log management tools, or
SIEM systems[26] provides additional data for analysis, which increases the model's accuracy.
Performance and optimization issues are equally important: the model must operate in real time or
close to it to ensure timely detection and response to threats[27]. This requires optimization of
algorithms and the use of efficient data processing methods, such as streaming processing or
hardware acceleration.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>To evaluate the effectiveness of the proposed method of detecting software implants using software
decoys, a detailed experimental analysis was conducted. The purpose of the experiment was to
compare the proposed method with existing malware detection methods, such as signature
analysis[28], behavioral analysis, and machine learning-based methods[29].</p>
      <p>The first step of the experiment was to prepare a relevant dataset that would adequately reflect
the real conditions of the system. For this purpose, we collected a large dataset consisting of various
types of malware[30] and legitimate programs. Malicious samples included trojans, rootkits,
backdoors, spyware, and other types of software implants. These samples were obtained from open
sources, such as VirusTotal, MalwareBazaar, and other specialized repositories. To ensure a
representative dataset, 5000 samples of malware and 5000 samples of legitimate programs were
selected, including system utilities, office applications, browsers, and other legitimate software. Each
sample was thoroughly tested for errors and correct operation. An even distribution between the
different types of malware was ensured to avoid bias in the results of the experiment. Next, the data
was labeled. Malicious samples were labeled as negative (label "1") and legitimate programs as
positive (label "0"). This allowed us to use binary classification methods[31] to analyze the data. For
each sample, information was collected on file system interaction, RAM usage, process behavior, and
network activity. This data was obtained using specialized monitoring tools such as Sysinternals
Suite, Wireshark, and custom software decoys integrated into the system[32]. Special attention was
paid to the feature extraction process. About 100 different features were identified for each sample,
including:
•
•
•
•</p>
      <p>File operations - the number of files created, deleted, modified, file types interacted with,
changes in attributes and access rights.</p>
      <p>Memory operations - number of memory segments created, changes in memory access
rights, amount of memory used, code injections.</p>
      <p>Process behavior - the number of processes created and terminated, the use of system calls,
interaction between processes, attempts to gain elevated privileges.</p>
      <p>Network activity - the number of established connections, ports and protocols used, IP
addresses, and the amount of data transmitted and received.</p>
      <p>To ensure data quality, the features were normalized and scaled. This allowed us to avoid the
influence of the scales of various parameters on the modeling results. A correlation analysis was also
performed to identify and eliminate redundant data.</p>
      <p>After preparing the dataset, a series of experiments was launched to compare the effectiveness of
different methods for detecting software implants. The experiments were conducted in a controlled
environment using specialized hardware and software.</p>
      <p>In the first experiment, we applied signature analysis. For this purpose, antivirus software with
up-to-date signature databases was used[33]. The dataset was run through the antivirus and the
results were recorded. The signature analysis allowed us to detect most of the known samples of
software implants, but showed low efficiency in relation to new or modified samples.</p>
      <p>The second experiment involved the use of behavioral analysis. A monitoring system was
deployed that analyzed the behavior of programs in real time. This method made it possible to detect
malware that exhibited abnormal activity, but had limitations regarding hidden or well-camouflaged
software implants. The third experiment was conducted using machine learning methods. The
dataset was divided into training and test samples in the ratio of 70/30. Classification algorithms such
as logistic regression, SVM, and decision trees were used. The models were trained on the training
set and tested on the test set. The results showed better performance compared to previous methods,
but still had shortcomings in detecting new types of software implants [34].</p>
      <p>In the fourth experiment, the proposed method was applied using software decoys and in-depth
analysis of system parameters. Additional software decoys were created to simulate critical system
resources[35]. This made it possible to attract software implants and detect their activity at early
stages. Deep neural networks were also used to analyze complex behavioral patterns.</p>
      <p>The model was trained on the full dataset using cross-validation to improve overall performance.
Metrics such as True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN)
were used to accurately assess the effectiveness of each method. These metrics allow us to analyze
the classification results in detail and determine the number of correct and incorrect detections.</p>
      <p>The results obtained indicate a significant advantage of the proposed method for detecting
software implants over traditional approaches. In particular, the proposed method achieved the
highest accuracy (95%), completeness (94%), prediction accuracy (96%), and F1-measure (95%). This
demonstrates the method's ability to effectively detect both known and new malware samples[37].
The analysis of TP, TN, FP, and FN indicators shows that the proposed method has the lowest number
of false positives (FP = 200) and undetected threats (FN = 300) compared to other methods. This is
especially important in the context of detecting hidden or well-camouflaged software implants that
may go undetected using traditional methods</p>
      <p>Comparison with machine learning methods shows that even when using modern algorithms
such as logistic regression, SVM, and decision trees, there are limitations in detecting new types of
malware. The proposed method, through the use of software decoys and in-depth analysis of
behavioral patterns, outperforms these approaches by all major metrics.</p>
      <p>Thus, the experimental results confirm the feasibility of implementing the proposed method in
cybersecurity systems. It not only improves the detection rate of software implants, but also reduces
the risk of missing new or modified threats, which is critical to ensuring the protection of
information systems.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>Experimental results show that the proposed method significantly outperforms other methods in all
major metrics. In particular, the high number of True Positive (TP) and True Negative (TN) indicates
the method's ability to accurately identify both malware and legitimate software. Low values of False
Positive (FP) and False Negative (FN) indicate a minimum number of false positives and missed
threats, which is critical for cybersecurity.</p>
      <p>The analysis of Accuracy shows that the proposed method reaches 95%, which is a significant
improvement over signature analysis (85%), behavioral analysis (89%), and machine learning
methods (91%). This indicates that an integrated approach that includes the use of software decoys
and in-depth analysis of system parameters is more effective in detecting modern complex threats.</p>
      <p>The high Recall and Precision values also confirm the effectiveness of the proposed method. The
94% completeness means that the method is able to detect most of the available malicious samples,
while the 96% prediction accuracy indicates that most of the detected threats are indeed malicious.
This is important to reduce the number of false positives that can divert resources and attention of
security professionals.</p>
      <p>Detection time is also an important factor. The proposed method provides fast data analysis,
which allows detecting threats in almost real time. Compared to the machine learning method, which
requires an average of 1.5 seconds per sample, the proposed method performs analysis in 1.0 seconds,
which can be critical in scenarios where response time is critical.</p>
      <p>A detailed analysis of the results for different types of malware shows that the proposed method
is effective for a wide range of threats. For example, for rootkits, which are usually difficult to detect
due to their ability to hide their presence, the method achieved a detection rate of 93%, which is
significantly higher than the results of other methods.</p>
      <p>The use of software decoys has proven to be particularly effective in detecting software implants
that attempt to interact with critical system resources or gain unauthorized access to data. This
allows you to detect threats at an early stage, before they can cause significant damage to the system.
In addition, the use of deep neural networks to analyze complex behavioral patterns allowed the
model to learn to recognize even those threats that use modern detection bypass techniques such as
code obfuscation, polymorphism, and metamorphism.</p>
      <p>However, it should be noted that the proposed method requires significant computing resources
to process a large amount of data and train the model. This can be a challenge for systems with
limited resources or in environments where data from a large number of endpoints must be
processed.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>The experimental analysis confirms the high efficiency of the proposed method for detecting
software implants using software decoys and in-depth analysis of system parameters. The method
demonstrates a significant improvement in all key metrics compared to traditional methods based
on signature analysis, behavioral analysis, and machine learning.</p>
      <p>The proposed approach allows not only detecting known threats but also effectively detecting
new and previously unknown malware that uses sophisticated techniques to bypass detection tools.
The use of software decoys provides an additional level of protection, allowing to detect attempts of
unauthorized access to critical system resources.</p>
      <p>The high accuracy, completeness, and speed of detection make this method promising for use in
cybersecurity systems where it is necessary to ensure the maximum level of protection with minimal
false positives. In future research, it is advisable to consider optimizing the model to reduce
computational costs, as well as conducting real-world testing to assess the practical effectiveness and
resistance of the method to various types of attacks.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling
check; DeepL Translate in order to: some phrases translation into English. After using these
tools/services, the authors reviewed and edited the content as needed and take full responsibility for
the publication’s content.
[24] I. Kok, F. Y. Okay, O. Muyanli, and S. Ozdemir, Explainable artificial intelligence (XAI) for Internet
of Things: A survey, arXiv preprint, arXiv:2206.04800, 2022.
[25] D. Kim, et al, Class scatter ratio based Mahalanobis distance approach for detection of Internet of</p>
      <p>Things traffic anomalies, Mobile Networks and Applications, (2023) 1–12.
[26] A. Fahim, K and starting means for k-means algorithm, Journal of Computational Science,. 55
(2021) 101445.
[27] P. Maniriho, A. N. Mahmood, and M. J. M. Chowdhury, A systematic literature review on
Windows malware detection: Techniques, research issues, and future directions," Journal of
Systems and Software, vol. 2023, p. 111921, 2023. doi:10.1016/j.jss.2023.111921.
[28] J. Lansky, et al., Deep learning-based intrusion detection systems: A systematic review, IEEE</p>
      <p>Access, 9 (2021) 101574–101599.
[29] S. Vladov, Z. Avkurova, V. Lytvyn, and Y. Zhovnir, Analytical neural network system for the
helicopter turboshaft engines operating modes classification, International Journal of Computing,
23(3) (2024) 342–359. doi:10.47839/ijc.23.3.3653.
[30] R. Berdibayev, et al., A concept of the architecture and creation for SIEM system in critical
infrastructure, in: Systems, Decision and Control in Energy II, Cham: Springer International
Publishing, 2021, pp. 221–242.
[31] O. Savenko, S. Lysenko, A. Kryshchuk, Y. Klots. Proceedings of the 7-th IEEE International
Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and
Applications, Berlin (Germany), September 12–14, 2013. Berlin, 2013. Pp. 363–368.
[32] Z. Yu, Precision Marketing Optimization Model of e-Commerce Platform Based on Collaborative</p>
      <p>Filtering Algorithm, Wireless Communications and Mobile Computing 2022 (2022) 1–10.
[33] S. K. J. Rizvi, W. Aslam, M. Shahzad, S. Saleem, and M. M. Fraz, PROUD-MAL: Static
analysisbased progressive framework for deep unsupervised malware classification of Windows portable
executable, Complex &amp; Intelligent Systems, (2022) 1–13.
[34] S. Ritwika and K. B. Raju, Malicious software detection and analyzation using the various machine
learning algorithms, in: 2022 13th International Conference on Computing Communication and
Networking Technologies (ICCCNT), IEEE, 2022, pp. 1–7.
[35] I. Obeidat and M. AlZubi, Developing a faster pattern matching algorithm for intrusion detection
system," International Journal of Computing, 18(3) (2019) 278–284.
[36] E. M. Cherrat, R. Alaoui, and H. Bouzahir, Score fusion of finger vein and face for human
recognition based on convolutional neural network model, International Journal of Computing,
19(1) (2020) 11–19. doi:10.47839/ijc.19.1.1688.
[37] N. Kayhan, S. Fekri-Ershad, Content based image retrieval based on weighted fusion of texture
and color features derived from modified local binary patterns and local neighborhood difference
patterns, Multimedia Tools and Applications, 80(21) (2021) 32763- 32790.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>T.</given-names>
            <surname>Flügge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kramer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nelson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nahles</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Kernen</surname>
          </string-name>
          ,
          <article-title>Digital implantology-a review of virtual planning software for guided implant surgery. Part II: Prosthetic set-up and virtual implant planning</article-title>
          ,
          <source>BMC Oral Health</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>23</fpage>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nadim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Akopian</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>A review on learning-based detection approaches of the kernel-level rootkit</article-title>
          , in: 2021 International Conference on Engineering and
          <article-title>Emerging Technologies (ICEET)</article-title>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <article-title>Backdoor learning: A survey</article-title>
          ,
          <source>EEE Transactions on Neural Networks and Learning Systems</source>
          , vol.
          <volume>35</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>5</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Maniriho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Mahmood</surname>
          </string-name>
          , and
          <string-name>
            <surname>M. J. M. Chowdhury</surname>
          </string-name>
          ,
          <article-title>A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges</article-title>
          ,
          <source>Future Generation Computer Systems</source>
          , vol.
          <volume>130</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          ,.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. B.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and V. K.</given-names>
            <surname>Saraswat</surname>
          </string-name>
          ,
          <article-title>Advanced persistent threats (APT): Evolution, anatomy, attribution and countermeasures</article-title>
          ,
          <source>Journal of Ambient Intelligence and Humanized Computing</source>
          ,
          <volume>14</volume>
          (
          <issue>7</issue>
          ) (
          <year>2023</year>
          )
          <fpage>9355</fpage>
          -
          <lpage>9381</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>You</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <article-title>Vulnerability exploitation time prediction: An integrated framework for dynamic imbalanced learning</article-title>
          ,
          <source>World Wide Web</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          .
          <article-title>A Technique for detection of bots which are using polymorphic code</article-title>
          .
          <source>Communications in Computer and Information Science</source>
          .
          <year>2014</year>
          .Vol.
          <volume>431</volume>
          . PP.
          <volume>265</volume>
          -
          <fpage>276</fpage>
          , ISSN:
          <fpage>1865</fpage>
          -
          <lpage>0929</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Vemuri</surname>
          </string-name>
          ,
          <article-title>"ROBUST: RTL Obfuscation Using Bi-functional Polymorphic Operators</article-title>
          ,
          <source>in: 2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>499</fpage>
          -
          <lpage>504</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bobrovnikova</surname>
          </string-name>
          <article-title>A Technique for the Botnet Detection Based on DNS-Traffic Analysis</article-title>
          .
          <source>Communications in Computer and Information Science</source>
          .
          <year>2015</year>
          . Vol.
          <volume>522</volume>
          . PP.
          <volume>127</volume>
          -
          <fpage>138</fpage>
          , ISSN:
          <fpage>1865</fpage>
          -
          <lpage>0929</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>You</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>Honeyvp: A cost-effective hybrid honeypot architecture for industrial control systems</article-title>
          ,
          <source>in: ICC 2021-IEEE International Conference on Communications, IEEE</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Manders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Brandsma</surname>
          </string-name>
          , J. de Kanter,
          <string-name>
            <given-names>M.</given-names>
            <surname>Verheul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Oka</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. J. van Roosmalen</surname>
          </string-name>
          , et al.,
          <article-title>MutationalPatterns: The one stop shop for the analysis of mutational processes</article-title>
          ,
          <source>BMC Genomics</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>134</fpage>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          <article-title>. Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic</article-title>
          .
          <source>Communications in Computer and Information Science</source>
          .
          <year>2013</year>
          . Vol.
          <volume>370</volume>
          . PP.
          <volume>243</volume>
          -
          <fpage>254</fpage>
          , ISSN:
          <fpage>1865</fpage>
          -
          <lpage>0929</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          , G. Jeon, and
          <string-name>
            <given-names>F.</given-names>
            <surname>Piccialli</surname>
          </string-name>
          ,
          <article-title>From artificial intelligence to explainable artificial intelligence in industry 4.0: A survey on what, how, and where</article-title>
          ,
          <source>IEEE Transactions on Industrial Informatics</source>
          ,
          <volume>18</volume>
          (
          <issue>8</issue>
          ) (
          <year>2022</year>
          )
          <fpage>5031</fpage>
          -
          <lpage>5042</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Janiesch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zschech</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Heinrich</surname>
          </string-name>
          ,
          <article-title>Machine learning and deep learning</article-title>
          ,
          <source>Electronic Markets</source>
          ,
          <volume>31</volume>
          (
          <issue>3</issue>
          ) (
          <year>2021</year>
          )
          <fpage>685</fpage>
          -
          <lpage>695</lpage>
          ,.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Moroz</surname>
          </string-name>
          ,
          <article-title>Research of network characteristics of the communication interface of multiprocessor modular systems</article-title>
          ,
          <source>Computer Systems and Information Technologies</source>
          ,
          <volume>3</volume>
          (
          <year>2022</year>
          )
          <fpage>82</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>K.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karnouskos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sauter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Colombo</surname>
          </string-name>
          ,
          <article-title>Advancements in industrial cyber-physical systems: An overview and perspectives</article-title>
          ,
          <source>IEEE Transactions on Industrial Informatics</source>
          ,
          <volume>19</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>716</fpage>
          -
          <lpage>729</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ming</surname>
          </string-name>
          , X. Cheng, and G. Srivastava,
          <article-title>Secure and resilient artificial intelligence of things: A HoneyNet approach for threat detection and situational awareness</article-title>
          ,
          <source>IEEE Consumer Electronics Magazine</source>
          ,.
          <volume>11</volume>
          (
          <issue>3</issue>
          ) (
          <year>2021</year>
          )
          <fpage>69</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Papaspirou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Maglaras</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Ferrag</surname>
          </string-name>
          , I. Kantzavelou,
          <string-name>
            <given-names>H.</given-names>
            <surname>Janicke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Douligeris</surname>
          </string-name>
          ,
          <article-title>A novel two-factor honeytoken authentication mechanism</article-title>
          , in: 2021
          <source>International Conference on Computer Communications and Networks (ICCCN)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Makrakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kolias</surname>
          </string-name>
          , G. Kambourakis,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rieger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Benjamin</surname>
          </string-name>
          ,
          <article-title>Industrial and critical infrastructure security: Technical analysis of real-life security incidents</article-title>
          ,
          <source>IEEE Access</source>
          ,
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>165295</fpage>
          -
          <lpage>165325</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Xu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <article-title>Application of recurrent neural network to mechanical fault diagnosis: A review,"</article-title>
          <source>Journal of Mechanical Science and Technology</source>
          , vol.
          <volume>36</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>527</fpage>
          -
          <lpage>542</lpage>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ketkar</surname>
          </string-name>
          , et al Convolutional neural
          <article-title>networks, in: Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch</article-title>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>242</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Chornobuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Dubrovyn</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Deineha</surname>
          </string-name>
          , Cybersecurity: Research of DDoS detection methods,
          <source>Computer Systems and Information Technologies</source>
          ,
          <volume>4</volume>
          (
          <year>2023</year>
          )
          <fpage>6</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>Bobrovnikova DNS-based Anti-evasion Technique for Botnets Detection</article-title>
          .
          <source>Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , Warsaw (Poland),
          <source>September 24-26</source>
          ,
          <year>2015</year>
          .Warsaw,
          <year>2015</year>
          . Pp.
          <volume>453</volume>
          -
          <fpage>458</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>