<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Detecting software implants using system decoys ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Dmytro</forename><surname>Denysiuk</surname></persName>
							<email>denysiuk@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleg</forename><surname>Savenko</surname></persName>
							<email>savenko_oleg_st@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sergii</forename><surname>Lysenko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Bohdan</forename><surname>Savenko</surname></persName>
							<email>savenko_bohdan@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Nicheporuk</surname></persName>
							<email>nicheporuka@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">International Workshop on Advanced Applied Information Technologies</orgName>
								<address>
									<addrLine>December 5</addrLine>
									<postCode>2024</postCode>
									<settlement>KhmelnytskyiZilina</settlement>
									<country>Ukraine -, Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Detecting software implants using system decoys ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">77055C69E895C5AB9372417B1896AA42</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>malware detection, software implants, software decoys, behavioral analysis, machine learning, deep learning, recurrent neural networks, cybersecurity, intrusion detection systems (IDS). 1 (A. Nicheporuk) 0000-0002-7345-8341 (D. Denysiuk)</term>
					<term>0000-0002-4104-745X (O. Savenko)</term>
					<term>0000-0001-7243-8747 (S. Lysenko)</term>
					<term>0000-0001-5647-9979 (B. Savenko)</term>
					<term>0000-0002-7230-9475 (A. Nicheporuk)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper presents a new method for detecting software implants based on the use of software decoys and in-depth analysis of system parameters. The aim of the study was to compare the effectiveness of the proposed method with existing approaches, such as signature analysis, behavioral analysis, and machine learning-based methods. For this purpose, a relevant dataset was collected, including 5000 malware samples and 5000 legitimate programs. Each sample was analyzed for detailed signs of interaction with the file system, RAM, process behavior, and network activity. The research methodology included data collection and labeling, feature extraction and normalization, and the use of recurrent neural networks (RNNs) to analyze complex behavioral patterns. The proposed method used software decoys to attract malware, which allowed detecting its activity at early stages. Experiments showed that the method achieves 95% accuracy, 94% completeness, 96% prediction accuracy, and 95% F1-measure, which significantly exceeds the performance of signature analysis (85% accuracy), behavioral analysis (89% accuracy), and machine learning methods (91% accuracy). The proposed approach has several key advantages: the active use of software decoys increases the likelihood of detecting threats, in-depth analysis of system parameters provides a comprehensive overview of program behavior, and the use of RNNs allows recognizing complex and unknown patterns. In addition, the method demonstrates a high detection rate, which makes it suitable for use in real-time systems. The results of the study indicate the high potential of the proposed method for improving the cybersecurity of modern information systems. The method can be integrated into existing protection systems, such as intrusion detection systems (IDS) and SIEM systems, providing a more efficient and prompt response to cyber threats. In future research, it is planned to expand the dataset and optimize the model to reduce computational costs, as well as conduct testing in real-world environments to assess the practical effectiveness of the method. Thus, the proposed method represents a significant step forward in the field of software implant detection, providing high accuracy, completeness and speed of detection, which is critical for protecting information systems from modern and evolving cyber threats.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The proliferation of software implants <ref type="bibr" target="#b0">[1]</ref>, such as malware, rootkits <ref type="bibr" target="#b1">[2]</ref>, and backdoors <ref type="bibr" target="#b2">[3]</ref>, poses a significant threat to the information security of modern computer systems. These malicious components hidden in software are capable of unauthorized access to system resources, stealing confidential information, and compromising data integrity. The increasing complexity and sophistication of software implants makes them difficult to detect using traditional methods based on signature analysis or simple anomaly detection.</p><p>A software implant is a malicious code <ref type="bibr" target="#b3">[4]</ref> or module that is secretly installed on computer systems or devices to gain unauthorized access, collect confidential information, or perform other destructive actions without the user's knowledge. They are often used as part of sophisticated cyberattacks, such as advanced persistent threats (APTs) <ref type="bibr" target="#b4">[5]</ref>, providing long-term covert access to compromised systems.</p><p>Software implants can be introduced into a system through various methods, including exploitation of vulnerabilities <ref type="bibr" target="#b5">[6]</ref> in software, social engineering, or infected updates. They are able to operate undetected for a long time, carrying out malicious operations without detection, which is a particular danger for organizations, as it can lead to significant financial losses, loss of reputation, and leakage of confidential information.</p><p>One of the key challenges in detecting software implants is their ability to bypass security controls. Modern implants can use stealth techniques, such as rootkits, which modify the operating system kernel or inject code into legitimate processes. This allows them to evade detection by antivirus programs and other security tools that rely on checking known signatures or detecting abnormal behavior.</p><p>Additionally, the development of obfuscation <ref type="bibr" target="#b6">[7]</ref> and polymorphism <ref type="bibr" target="#b7">[8]</ref> techniques allows malware to change its code or behavior, making it difficult to detect <ref type="bibr" target="#b8">[9]</ref> even with advanced analyzers. This underscores the need to develop new methods that are independent of prior knowledge of malware and can effectively respond to new threats.</p><p>One of the most promising areas in the fight against software implants is the use of system decoys <ref type="bibr" target="#b9">[10]</ref> that act as traps for malware. System decoys can be implemented in the form of specially created files, processes, or network services that imitate vulnerable or attractive objects for attackers. When malware interacts with such decoys, its presence is detected and the threat is neutralized.</p><p>Compared to traditional methods, the use of system decoys has several advantages. First, these tools do not rely on known signatures <ref type="bibr" target="#b10">[11]</ref> or malware behavioral patterns, making them effective against new or modified threats. Secondly, decoys can be integrated at different levels of a system, providing multi-level protection. Thirdly, interaction with the decoy can help collect additional information about the malware, allowing for more detailed analysis and development of countermeasures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Overview of existing solutions</head><p>Honeypot systems continue to play an important role in ensuring the cybersecurity of modern computer networks. They function as specialized tools that simulate <ref type="bibr" target="#b12">[13]</ref> real systems or services in order to attract attackers, allowing cybersecurity professionals to investigate their methods and techniques in detail. Between 2021 and 2024, there have been significant advances in the development of honeypot architectures and related software, including integration with artificial intelligence <ref type="bibr" target="#b12">[13]</ref> and machine learning <ref type="bibr" target="#b13">[14]</ref> technologies to improve threat detection and analysis. These systems not only help identify potential threats, but also provide in-depth analysis of attackers' actions in various environments, including cloud computing, the Internet of Things (IoT), industrial cyber-physical systems (CPS) <ref type="bibr" target="#b14">[15]</ref>, and traditional network infrastructures. In addition, the improvement of honeypot systems contributes to the formation of more adaptive and proactive cyber defense strategies, which is important in the context of the growing complexity and scale of modern cyber threats.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Main categories of honeypot systems</head><p>Honeypot systems are divided into two main types depending on the level of interaction: low interaction and high interaction. Low-interaction systems, such as Honey, are limited to emulating a limited set of services. They involve only basic attack attempts such as port scans or entry-level exploits. Although these systems are less resource-intensive, they are not capable of investigating sophisticated attack methods in detail. In contrast, highly interoperable systems, such as Dionaea or Kippo, offer attackers full operating systems or real services to interact with. This allows attackers to perform more complex operations while remaining isolated from critical systems. Thanks to this, experts can get more information about the penetration methods used by cybercriminals. T-Pot, for example, is a comprehensive platform that integrates several honeypot solutions and provides in-depth real-time analysis. The system has been active in recent years and has received updates aimed at improving performance and monitoring capabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Honeynet systems</head><p>Honeynet systems <ref type="bibr" target="#b15">[16]</ref> consist of several honeypot services, which allows you to simulate an entire network infrastructure, including servers, databases, and other important elements of corporate systems. One important example of a modern honeynet architecture is HoneyFactory, which uses container technologies to create virtual environments. This solution provides fast deployment of complex network systems and enhances attack detection capabilities through the use of cyber detection. Compared to previous versions of honeynet, HoneyFactory shows better results in terms of protection efficiency due to the high speed of request processing and flexible system settings for different business needs.</p><p>The use of honeynet systems has become popular in various environments, including IoT and CPS. These technologies allow you to protect not only traditional network environments, but also new-generation infrastructures, where it is important to monitor both internal and external threats. Recent studies have emphasized the importance of integrating such systems into critical infrastructure to obtain enhanced information about attack methods and their prevention.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Honeytoken, Honeypatch та Honeyclient</head><p>In addition to honeypot systems, other decoys are being actively developed that perform additional functions in threat detection. Honeytoken <ref type="bibr" target="#b16">[17]</ref> is one of the most common tools for detecting unauthorized activities on the network. Programs such as Canarytokens allow you to create decoy files that automatically generate alerts when they are accessed. For example, a file that looks like an important document can be a signal to detect cybercriminals trying to read or modify it.</p><p>Honeypatch, introduced in 2023, is an innovative technology that allows you to test the security of systems without risking productive environments. It creates vulnerable components that attackers can attack, allowing you to study their behavior and find new threats. This method is effectively used to collect information about attacks and to test the readiness of systems to exploit vulnerabilities.</p><p>Honeyclient systems, such as Capture-HPC, are used to detect threats targeting client applications. They actively interact with potentially malicious websites and analyze the methods used to infect client applications. This technology allows you to effectively simulate real user behavior and detect attacks such as drive-by downloads.</p><p>Thus, the development of malware detection systems using decoys is a promising and highly sought-after area. The use of such technologies allows not only to detect and analyze modern cyber threats more effectively, but also to predict possible attacks, increasing the overall level of security of information systems. Further development and implementation of decoy software will help create more adaptive and proactive protection strategies, which is important in the context of the everincreasing complexity and dynamics of malware.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Detection of software implants</head><p>Successful development of a malware decoy detection model requires an in-depth analysis of the parameters that the system will monitor. Identifying these parameters is key to effectively detecting and analyzing malicious activity on the system. The main aspects that need to be considered in detail include file system interaction, changes in RAM usage, process behavior, and network activity. Understanding the behavioral patterns typical of software implants is critical to developing an effective model.</p><p>Successful development of a malware decoy detection model requires an in-depth analysis of the parameters that the system will monitor. Identifying these parameters is key to effectively detecting and analyzing malicious activity on the system. The main aspects that need to be considered in detail include file system interaction, changes in RAM usage, process behavior, and network activity. Understanding the behavioral patterns typical of software implants is critical to developing an effective model.</p><p>Analyzing such patterns includes tracking the frequency and types of file operations, monitoring changes in directory structure, and detecting unusual or suspicious changes in file sizes. To quantify anomalies in the file system, you can use the anomaly indicator 𝐴𝐴 𝑓𝑓 :</p><formula xml:id="formula_0">𝐴𝐴 𝑓𝑓 = � 𝜔𝜔 𝑖𝑖 • � 𝑓𝑓 𝑖𝑖 − 𝜇𝜇 𝑖𝑖 𝜎𝜎 𝑖𝑖 � 𝑁𝑁 𝑖𝑖=1 ,<label>(1)</label></formula><p>where:</p><p>• 𝑓𝑓 𝑖𝑖 − frequency of the operation 𝑖𝑖 ′ ;</p><p>• 𝜇𝜇 𝑖𝑖 and 𝜎𝜎 𝑖𝑖 − average value and standard deviation of the frequency𝑓𝑓 𝑖𝑖 in the normal state of the system; • 𝜔𝜔 𝑖𝑖 − weighting factor for the operation 𝑖𝑖;</p><p>It is especially important to pay attention to operations with system files, configuration files, and the registry, as changes to them may indicate attempts to compromise the system.</p><p>Changes in the operation of RAM are another significant indicator of a potential threat. Software implants can load their code directly into memory, bypassing the file system, or inject it into the memory of other processes, making them difficult to detect using traditional methods. Analysis of memory usage patterns includes monitoring the creation of new memory segments, changes in access rights to them, and analyzing the contents of memory for malicious signatures or abnormal data structures.</p><p>To quantify changes in memory usage, you can consider the rate of change in the amount of memory used:</p><formula xml:id="formula_1">∆𝑀𝑀 = 𝑑𝑑𝑀𝑀 𝑡𝑡 𝑑𝑑𝑑𝑑<label>(2)</label></formula><p>where 𝑀𝑀 𝑡𝑡 − the amount of memory used at a given time𝑑𝑑. If the value ∆𝑀𝑀 exceeds the threshold value𝑇𝑇 𝑀𝑀 , this may indicate abnormal activity. For example, the detection of executable code in memory areas that usually do not contain such code can be described through the indicator function 𝐼𝐼 𝑑𝑑𝑑𝑑𝑡𝑡 :</p><formula xml:id="formula_2">𝐼𝐼 𝑑𝑑𝑑𝑑𝑡𝑡 (𝑥𝑥) = � 1, 0, 𝑖𝑖𝑓𝑓 𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚 𝑙𝑙𝑚𝑚𝑙𝑙𝑙𝑙𝑑𝑑𝑖𝑖𝑚𝑚𝑙𝑙 𝑥𝑥 𝑙𝑙𝑚𝑚𝑙𝑙𝑑𝑑𝑙𝑙𝑖𝑖𝑙𝑙𝑐𝑐 𝑚𝑚𝑥𝑥𝑚𝑚𝑙𝑙𝑒𝑒𝑑𝑑𝑙𝑙𝑒𝑒𝑙𝑙𝑚𝑚 𝑙𝑙𝑚𝑚𝑑𝑑𝑚𝑚 𝑚𝑚𝑑𝑑ℎ𝑚𝑚𝑚𝑚𝑒𝑒𝑖𝑖𝑐𝑐𝑚𝑚 ,<label>(3)</label></formula><p>If 𝐼𝐼 𝑑𝑑𝑑𝑑𝑡𝑡 (𝑥𝑥) = 1 for the region 𝑥𝑥, where the executable code is not expected, this may indicate a software implantation.</p><p>The behavior of processes in a system also provides important information for detecting malicious activity. Software implants can create new processes, modify existing ones, or interact with them in unusual ways. They may try to gain elevated privileges, change system settings, disable or bypass security features.</p><p>Analysis of process behavior patterns includes monitoring the creation and completion of processes, analyzing their interaction, tracking system calls, and resource usage. Logistic regression can be used to estimate the probability that a process is malicious:</p><formula xml:id="formula_3">𝑃𝑃(𝑒𝑒𝑙𝑙𝑚𝑚 | 𝑥𝑥) = 1 1 + 𝑚𝑚 −�𝛽𝛽 0 +∑ 𝛽𝛽 𝑖𝑖 𝑥𝑥 𝑖𝑖 𝑛𝑛 𝑖𝑖=1 � ,<label>(4)</label></formula><p>where:</p><p>• 𝑥𝑥 = (𝑥𝑥 1 , 𝑥𝑥 2 , 𝑥𝑥 3 , … , 𝑥𝑥 𝑖𝑖 ) − a vector of features related to the behavior of the process;</p><p>• 𝛽𝛽 𝑖𝑖 − model coefficients.</p><p>For example, a process that unexpectedly makes a large number of system calls related to network activity or file manipulation may have high values for the following attributes𝑥𝑥 𝑖𝑖 , which will increase the likelihood of 𝑃𝑃(𝑒𝑒𝑙𝑙𝑚𝑚 | 𝑥𝑥). In addition, you should pay attention to processes that run in the background without user interaction or try to hide their presence by changing their attributes.</p><p>Network activity of software implants is often one of the most obvious indicators of their presence. They may attempt to establish unauthorized connections to remote servers to transmit collected data, receive commands, or download additional modules. Analysis of network behavior patterns includes tracking the initiation of network connections, analyzing the protocols, ports, and IP addresses used. To quantify anomalies in network activity, you can use the anomaly indicator 𝐴𝐴 𝑛𝑛 :</p><formula xml:id="formula_4">𝐴𝐴 𝑛𝑛 = � 𝜔𝜔 𝑗𝑗 • � 𝑙𝑙 𝑗𝑗 − 𝜇𝜇 𝑗𝑗 𝜎𝜎 𝑗𝑗 � 2 𝑀𝑀 𝑗𝑗=1 ,<label>(5)</label></formula><p>where:</p><p>• 𝑙𝑙 𝑗𝑗 − measure parameter value 𝑗𝑗 (for example, the number of connections to a specific IP address); • 𝜇𝜇 𝑗𝑗 and 𝜎𝜎 𝑗𝑗 − the average value and standard deviation of this parameter in the normal state;</p><p>• 𝜔𝜔 𝑗𝑗 − weighting factor; For example, suddenly establishing connections to geographically remote or suspicious addresses, using non-standard or high ports, bypassing proxy servers or firewalls can indicate malicious activity. It's also important to analyze the volume and nature of the data being transmitted, including whether confidential information or large amounts of data are being transmitted for no apparent reason.</p><p>For in-depth analysis of these patterns, it is necessary to use modern machine learning and artificial intelligence methods. Deep learning algorithms, such as recurrent neural networks (RNNs) <ref type="bibr" target="#b18">[19]</ref> or convolutional neural networks (CNNs) <ref type="bibr" target="#b19">[20]</ref>, can be used to analyze sequences of actions and identify complex dependencies between different system parameters.</p><p>For example, a recurrent neural network models a sequence of input data {𝑥𝑥 1 , 𝑥𝑥 2 , 𝑥𝑥 3 , … , 𝑥𝑥 𝑖𝑖 } by calculating hidden states ℎ 𝑡𝑡 by the formula:</p><formula xml:id="formula_5">ℎ 𝑡𝑡 = 𝜑𝜑�𝑊𝑊 𝑥𝑥ℎ 𝑥𝑥 𝑡𝑡 + 𝑊𝑊 ℎℎ ℎ 𝑡𝑡−1 + 𝑒𝑒 ℎ �,<label>(6)</label></formula><p>where:</p><p>• 𝑊𝑊 𝑥𝑥ℎ , 𝑊𝑊 ℎℎ − weight matrices;</p><p>• 𝑒𝑒 ℎ − displacement vector;</p><p>• 𝜑𝜑 − activation function ReLU;</p><p>Network output 𝑚𝑚 𝑡𝑡 can be calculated as:</p><p>𝑚𝑚 𝑡𝑡 = 𝑊𝑊 ℎ𝑦𝑦 ℎ 𝑡𝑡 + 𝑒𝑒 𝑦𝑦 <ref type="bibr" target="#b6">(7)</ref> where:</p><p>• 𝑊𝑊 ℎ𝑦𝑦 − output weight matrix;</p><p>• 𝑒𝑒 𝑦𝑦 − displacement vector.</p><p>Analyzing time series of network activity using RNNs can help detect hidden patterns of communication between malware and command-and-control <ref type="bibr" target="#b20">[21]</ref> servers that can be disguised as legitimate traffic. In addition, it is important to consider contextual factors and profiles of normal system behavior. The use of behavioral analysis allows the model to detect deviations from the norm that may not be obvious when considering individual parameters. The Mahalanobis distance can be used to quantify the deviation <ref type="bibr" target="#b21">[22]</ref>:</p><formula xml:id="formula_6">𝐷𝐷 𝑀𝑀 = �(𝑥𝑥 − 𝜇𝜇) 𝑇𝑇 𝑆𝑆 −1 (𝑥𝑥 − 𝜇𝜇)<label>(8)</label></formula><p>where:</p><p>• 𝑥𝑥 − vector of sporasterzhuvannye signs;</p><p>• 𝜇𝜇 − is a vector of average values of features in the normal state;</p><p>• 𝑆𝑆 − is the covariance matrix. For example, a program that does not perform network activity under normal conditions but suddenly starts sending data to the network <ref type="bibr" target="#b22">[23]</ref> may have a significant 𝐷𝐷 𝑀𝑀 deviation, indicating an anomaly. Temporal aspects, such as the time of day when certain activities occur or the duration of sessions, should also be considered, which can help identify anomalies.</p><p>Software implants often use sophisticated techniques to bypass detection tools, such as polymorphism, metamorphism, code obfuscation, rootkits, and other concealment methods. Therefore, the model must be able to detect not only known signatures or patterns, but also new, previously unknown threats. This can be achieved by using unsupervised learning and clustering methods. One of them, the k-means algorithm <ref type="bibr" target="#b23">[24]</ref>, allows you to divide data into k clusters by minimizing the sum of squares of the distances between points and cluster centroids:</p><formula xml:id="formula_7">𝑙𝑙𝑚𝑚𝑎𝑎 𝑚𝑚𝑖𝑖𝑙𝑙 𝑆𝑆 � � ‖𝑥𝑥 𝑖𝑖 − 𝜇𝜇 𝑘𝑘 ‖ 2 𝑥𝑥 𝑖𝑖 ∈𝑆𝑆 𝑘𝑘 𝐾𝐾 𝑘𝑘=1<label>(9)</label></formula><p>where:</p><p>• 𝑆𝑆 𝑘𝑘 − cluster𝑘𝑘 ′ ;</p><p>• 𝜇𝜇 𝑘𝑘 − cluster centroid 𝑘𝑘;</p><p>Identifying new behavioral clusters can signal the emergence of new malicious patterns. Integration of the model with existing security and monitoring tools is an important component that provides an expanded picture of the system state and facilitates rapid response to threats. For example, integration with intrusion detection systems (IDS) <ref type="bibr" target="#b24">[25]</ref>, event log management tools, or SIEM systems <ref type="bibr" target="#b25">[26]</ref> provides additional data for analysis, which increases the model's accuracy. Performance and optimization issues are equally important: the model must operate in real time or close to it to ensure timely detection and response to threats <ref type="bibr" target="#b26">[27]</ref>. This requires optimization of algorithms and the use of efficient data processing methods, such as streaming processing or hardware acceleration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results</head><p>To evaluate the effectiveness of the proposed method of detecting software implants using software decoys, a detailed experimental analysis was conducted. The purpose of the experiment was to compare the proposed method with existing malware detection methods, such as signature analysis <ref type="bibr" target="#b27">[28]</ref>, behavioral analysis, and machine learning-based methods <ref type="bibr" target="#b28">[29]</ref>.</p><p>The first step of the experiment was to prepare a relevant dataset that would adequately reflect the real conditions of the system. For this purpose, we collected a large dataset consisting of various types of malware <ref type="bibr" target="#b29">[30]</ref> and legitimate programs. Malicious samples included trojans, rootkits, backdoors, spyware, and other types of software implants. These samples were obtained from open sources, such as VirusTotal, MalwareBazaar, and other specialized repositories. To ensure a representative dataset, 5000 samples of malware and 5000 samples of legitimate programs were selected, including system utilities, office applications, browsers, and other legitimate software. Each sample was thoroughly tested for errors and correct operation. An even distribution between the different types of malware was ensured to avoid bias in the results of the experiment. Next, the data was labeled. Malicious samples were labeled as negative (label "1") and legitimate programs as positive (label "0"). This allowed us to use binary classification methods <ref type="bibr" target="#b30">[31]</ref> to analyze the data. For each sample, information was collected on file system interaction, RAM usage, process behavior, and network activity. This data was obtained using specialized monitoring tools such as Sysinternals Suite, Wireshark, and custom software decoys integrated into the system <ref type="bibr" target="#b31">[32]</ref>. Special attention was paid to the feature extraction process. About 100 different features were identified for each sample, including:</p><p>• File operations -the number of files created, deleted, modified, file types interacted with, changes in attributes and access rights. • Memory operations -number of memory segments created, changes in memory access rights, amount of memory used, code injections. • Process behavior -the number of processes created and terminated, the use of system calls, interaction between processes, attempts to gain elevated privileges. • Network activity -the number of established connections, ports and protocols used, IP addresses, and the amount of data transmitted and received.</p><p>To ensure data quality, the features were normalized and scaled. This allowed us to avoid the influence of the scales of various parameters on the modeling results. A correlation analysis was also performed to identify and eliminate redundant data.</p><p>After preparing the dataset, a series of experiments was launched to compare the effectiveness of different methods for detecting software implants. The experiments were conducted in a controlled environment using specialized hardware and software.</p><p>In the first experiment, we applied signature analysis. For this purpose, antivirus software with up-to-date signature databases was used <ref type="bibr" target="#b32">[33]</ref>. The dataset was run through the antivirus and the results were recorded. The signature analysis allowed us to detect most of the known samples of software implants, but showed low efficiency in relation to new or modified samples.</p><p>The second experiment involved the use of behavioral analysis. A monitoring system was deployed that analyzed the behavior of programs in real time. This method made it possible to detect malware that exhibited abnormal activity, but had limitations regarding hidden or well-camouflaged software implants. The third experiment was conducted using machine learning methods. The dataset was divided into training and test samples in the ratio of 70/30. Classification algorithms such as logistic regression, SVM, and decision trees were used. The models were trained on the training set and tested on the test set. The results showed better performance compared to previous methods, but still had shortcomings in detecting new types of software implants <ref type="bibr" target="#b33">[34]</ref>.</p><p>In the fourth experiment, the proposed method was applied using software decoys and in-depth analysis of system parameters. Additional software decoys were created to simulate critical system resources <ref type="bibr" target="#b34">[35]</ref>. This made it possible to attract software implants and detect their activity at early stages. Deep neural networks were also used to analyze complex behavioral patterns.</p><p>The model was trained on the full dataset using cross-validation to improve overall performance. Metrics such as True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN) were used to accurately assess the effectiveness of each method. These metrics allow us to analyze the classification results in detail and determine the number of correct and incorrect detections. The TP (True Positive) value shows the number of correctly detected malicious samples. TN (True Negative) indicates the number of legitimate programs correctly identified. FP (False Positive) indicates the number of legitimate programs that were mistakenly <ref type="bibr" target="#b35">[36]</ref> recognized as malicious. FN (False Negative) shows the number of malicious samples that were not detected.</p><p>Based on these indicators, we calculated the metrics of accuracy, completeness, prediction accuracy, and F1-measure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2 Comparison of the effectiveness of detection methods</head><p>The results obtained indicate a significant advantage of the proposed method for detecting software implants over traditional approaches. In particular, the proposed method achieved the highest accuracy (95%), completeness (94%), prediction accuracy (96%), and F1-measure (95%). This demonstrates the method's ability to effectively detect both known and new malware samples <ref type="bibr" target="#b36">[37]</ref>. The analysis of TP, TN, FP, and FN indicators shows that the proposed method has the lowest number of false positives (FP = 200) and undetected threats (FN = 300) compared to other methods. This is especially important in the context of detecting hidden or well-camouflaged software implants that may go undetected using traditional methods</p><p>Comparison with machine learning methods shows that even when using modern algorithms such as logistic regression, SVM, and decision trees, there are limitations in detecting new types of malware. The proposed method, through the use of software decoys and in-depth analysis of behavioral patterns, outperforms these approaches by all major metrics. Thus, the experimental results confirm the feasibility of implementing the proposed method in cybersecurity systems. It not only improves the detection rate of software implants, but also reduces the risk of missing new or modified threats, which is critical to ensuring the protection of information systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion</head><p>Experimental results show that the proposed method significantly outperforms other methods in all major metrics. In particular, the high number of True Positive (TP) and True Negative (TN) indicates the method's ability to accurately identify both malware and legitimate software. Low values of False Positive (FP) and False Negative (FN) indicate a minimum number of false positives and missed threats, which is critical for cybersecurity.</p><p>The analysis of Accuracy shows that the proposed method reaches 95%, which is a significant improvement over signature analysis (85%), behavioral analysis (89%), and machine learning methods (91%). This indicates that an integrated approach that includes the use of software decoys and in-depth analysis of system parameters is more effective in detecting modern complex threats.</p><p>The high Recall and Precision values also confirm the effectiveness of the proposed method. The 94% completeness means that the method is able to detect most of the available malicious samples, while the 96% prediction accuracy indicates that most of the detected threats are indeed malicious. This is important to reduce the number of false positives that can divert resources and attention of security professionals.</p><p>Detection time is also an important factor. The proposed method provides fast data analysis, which allows detecting threats in almost real time. Compared to the machine learning method, which requires an average of 1.5 seconds per sample, the proposed method performs analysis in 1.0 seconds, which can be critical in scenarios where response time is critical. A detailed analysis of the results for different types of malware shows that the proposed method is effective for a wide range of threats. For example, for rootkits, which are usually difficult to detect due to their ability to hide their presence, the method achieved a detection rate of 93%, which is significantly higher than the results of other methods.</p><p>The use of software decoys has proven to be particularly effective in detecting software implants that attempt to interact with critical system resources or gain unauthorized access to data. This allows you to detect threats at an early stage, before they can cause significant damage to the system. In addition, the use of deep neural networks to analyze complex behavioral patterns allowed the model to learn to recognize even those threats that use modern detection bypass techniques such as code obfuscation, polymorphism, and However, it should be noted that the proposed method requires significant computing resources to process a large amount of data and train the model. This can be a challenge for systems with limited resources or in environments where data from a large number of endpoints must be processed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>The experimental analysis confirms the high efficiency of the proposed method for detecting software implants using software decoys and in-depth analysis of system parameters. The method demonstrates a significant improvement in all key metrics compared to traditional methods based on signature analysis, behavioral analysis, and machine learning.</p><p>The proposed approach allows not only detecting known threats but also effectively detecting new and previously unknown malware that uses sophisticated techniques to bypass detection tools. The use of software decoys provides an additional level of protection, allowing to detect attempts of unauthorized access to critical system resources.</p><p>The high accuracy, completeness, and speed of detection make this method promising for use in cybersecurity systems where it is necessary to ensure the maximum level of protection with minimal false positives. In future research, it is advisable to consider optimizing the model to reduce computational costs, as well as conducting real-world testing to assess the practical effectiveness and resistance of the method to various types of attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling check; DeepL Translate in order to: some phrases translation into English. After using these tools/services, the authors reviewed and edited the content as needed and take full responsibility for the publication's content.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell>Classification results for each method</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Method</cell><cell>TP</cell><cell>TN</cell><cell>FP</cell><cell>FN</cell></row><row><cell>Signature analysis</cell><cell>4000</cell><cell>4500</cell><cell>500</cell><cell>1000</cell></row><row><cell>Behavioral analysis</cell><cell>4250</cell><cell>4600</cell><cell>400</cell><cell>750</cell></row><row><cell>Machine learning</cell><cell>4400</cell><cell>4650</cell><cell>350</cell><cell>600</cell></row><row><cell>Request method</cell><cell>4700</cell><cell>4800</cell><cell>200</cell><cell>300</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Digital implantology-a review of virtual planning software for guided implant surgery. Part II: Prosthetic set-up and virtual implant planning</title>
		<author>
			<persName><forename type="first">T</forename><surname>Flügge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kramer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Nelson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nahles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Kernen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">BMC Oral Health</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">23</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A review on learning-based detection approaches of the kernel-level rootkit</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nadim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Akopian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2021 International Conference on Engineering and Emerging Technologies (ICEET), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Backdoor learning: A survey</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">T</forename><surname>Xia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EEE Transactions on Neural Networks and Learning Systems</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="22" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges</title>
		<author>
			<persName><forename type="first">P</forename><surname>Maniriho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Mahmood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J M</forename><surname>Chowdhury</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">130</biblScope>
			<biblScope unit="page" from="1" to="18" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Advanced persistent threats (APT): Evolution, anatomy, attribution and countermeasures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">B</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">K</forename><surname>Saraswat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Ambient Intelligence and Humanized Computing</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="9355" to="9381" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Vulnerability exploitation time prediction: An integrated framework for dynamic imbalanced learning</title>
		<author>
			<persName><forename type="first">J</forename><surname>Yin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>You</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World Wide Web</title>
		<imprint>
			<biblScope unit="page" from="1" to="23" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A Technique for detection of bots which are using polymorphic code</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">431</biblScope>
			<biblScope unit="page" from="265" to="276" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">ROBUST: RTL Obfuscation Using Bi-functional Polymorphic Operators</title>
		<author>
			<persName><forename type="first">H</forename><surname>Chakraborty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Vemuri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID), IEEE</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="499" to="504" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Bobrovnikova A Technique for the Botnet Detection Based on DNS-Traffic Analysis</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">522</biblScope>
			<biblScope unit="page" from="127" to="138" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Honeyvp: A cost-effective hybrid honeypot architecture for industrial control systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>You</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICC 2021-IEEE International Conference on Communications</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">MutationalPatterns: The one stop shop for the analysis of mutational processes</title>
		<author>
			<persName><forename type="first">F</forename><surname>Manders</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Brandsma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>De Kanter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Verheul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Van Roosmalen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">BMC Genomics</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">134</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">370</biblScope>
			<biblScope unit="page" from="243" to="254" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">From artificial intelligence to explainable artificial intelligence in industry 4.0: A survey on what, how, and where</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Jeon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Piccialli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Industrial Informatics</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="5031" to="5042" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Machine learning and deep learning</title>
		<author>
			<persName><forename type="first">C</forename><surname>Janiesch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Zschech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Heinrich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Markets</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="685" to="695" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Research of network characteristics of the communication interface of multiprocessor modular systems</title>
		<author>
			<persName><forename type="first">D</forename><surname>Moroz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Systems and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="82" to="90" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Advancements in industrial cyber-physical systems: An overview and perspectives</title>
		<author>
			<persName><forename type="first">K</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Karnouskos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sauter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Fang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">W</forename><surname>Colombo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Industrial Informatics</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="716" to="729" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Secure and resilient artificial intelligence of things: A HoneyNet approach for threat detection and situational awareness</title>
		<author>
			<persName><forename type="first">L</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ming</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Srivastava</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Consumer Electronics Magazine</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="69" to="78" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A novel two-factor honeytoken authentication mechanism</title>
		<author>
			<persName><forename type="first">V</forename><surname>Papaspirou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Maglaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Ferrag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kantzavelou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Janicke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Douligeris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2021 International Conference on Computer Communications and Networks (ICCCN), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Industrial and critical infrastructure security: Technical analysis of real-life security incidents</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Makrakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kolias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kambourakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rieger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Benjamin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="165295" to="165325" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Application of recurrent neural network to mechanical fault diagnosis: A review</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Qian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mechanical Science and Technology</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="527" to="542" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Convolutional neural networks</title>
		<author>
			<persName><forename type="first">N</forename><surname>Ketkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="197" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Cybersecurity: Research of DDoS detection methods</title>
		<author>
			<persName><forename type="first">M</forename><surname>Chornobuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dubrovyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Deineha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Systems and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="6" to="9" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Bobrovnikova DNS-based Anti-evasion Technique for Botnets Detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Warsaw (Poland); Warsaw</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">September 24-26, 2015. 2015</date>
			<biblScope unit="page" from="453" to="458" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Kok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">Y</forename><surname>Okay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Muyanli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ozdemir</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2206.04800</idno>
		<title level="m">Explainable artificial intelligence (XAI) for Internet of Things: A survey</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Class scatter ratio based Mahalanobis distance approach for detection of Internet of Things traffic anomalies</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mobile Networks and Applications</title>
		<imprint>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">K and starting means for k-means algorithm</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fahim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computational Science</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page">101445</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A systematic literature review on Windows malware detection: Techniques, research issues, and future directions</title>
		<author>
			<persName><forename type="first">P</forename><surname>Maniriho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Mahmood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J M</forename><surname>Chowdhury</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jss.2023.111921</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Systems and Software</title>
		<imprint>
			<biblScope unit="volume">2023</biblScope>
			<biblScope unit="page">111921</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Deep learning-based intrusion detection systems: A systematic review</title>
		<author>
			<persName><forename type="first">J</forename><surname>Lansky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="101574" to="101599" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Analytical neural network system for the helicopter turboshaft engines operating modes classification</title>
		<author>
			<persName><forename type="first">S</forename><surname>Vladov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Avkurova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhovnir</surname></persName>
		</author>
		<idno type="DOI">10.47839/ijc.23.3.3653</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="342" to="359" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">A concept of the architecture and creation for SIEM system in critical infrastructure</title>
		<author>
			<persName><forename type="first">R</forename><surname>Berdibayev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Systems, Decision and Control in Energy II</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="221" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<title level="m">Proceedings of the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Berlin (Germany; Berlin</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">September 12-14, 2013. 2013</date>
			<biblScope unit="page" from="363" to="368" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Precision Marketing Optimization Model of e-Commerce Platform Based on Collaborative Filtering Algorithm</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Yu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wireless Communications and Mobile Computing</title>
		<imprint>
			<biblScope unit="page" from="1" to="10" />
			<date type="published" when="2022">2022. 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">PROUD-MAL: Static analysisbased progressive framework for deep unsupervised malware classification of Windows portable executable</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K J</forename><surname>Rizvi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Aslam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shahzad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Saleem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Fraz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Complex &amp; Intelligent Systems</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="1" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Malicious software detection and analyzation using the various machine learning algorithms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ritwika</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">B</forename><surname>Raju</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Developing a faster pattern matching algorithm for intrusion detection system</title>
		<author>
			<persName><forename type="first">I</forename><surname>Obeidat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alzubi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="278" to="284" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Score fusion of finger vein and face for human recognition based on convolutional neural network model</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">M</forename><surname>Cherrat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Alaoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Bouzahir</surname></persName>
		</author>
		<idno type="DOI">10.47839/ijc.19.1.1688</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="11" to="19" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Content based image retrieval based on weighted fusion of texture and color features derived from modified local binary patterns and local neighborhood difference patterns</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kayhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fekri-Ershad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="issue">21</biblScope>
			<biblScope unit="page" from="32763" to="32790" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
