Show simple item record

dc.contributor.authorWilkins, Zachary
dc.date.accessioned2020-12-08T17:28:20Z
dc.date.available2020-12-08T17:28:20Z
dc.date.issued2020-12-08T17:28:20Z
dc.identifier.urihttp://hdl.handle.net/10222/80075
dc.description.abstractMalicious software is a persistent threat across our digital platforms. With unending malware growth, and increasingly higher profile attacks, organizations across the world are ramping up their cyber defence capabilities. Cluster analysis is one such tool for understanding the threats faced. By organizing seemingly disconnected samples according to their behaviours, attack patterns can be discerned and defended against. But given the volume of malware, an automated approach is necessary to scale. In this thesis, I design and implement a system called COUGAR which uses a multi-objective genetic algorithm to automatically optimize clustering algorithms. The clustering algorithms are applied to low-dimensional embeddings derived from high-dimensional malware behavioural data. The system employs function imports extracted from malicious binaries, but is flexible enough to accommodate many other features derived from static or dynamic malware analysis. After the optimization process completes, the system generates signatures for each cluster which prioritize usability and comprehensible signature components. The experiments indicate that any of the chosen clustering algorithms can produce at least satisfactory results, with density-based approaches generating especially successful clusters, achieving an F-Score of 0.79 and V-Measure of 0.88. The resulting signatures are very representative of their respective clusters, with the vast majority achieving representation scores of at least 90%.en_US
dc.language.isoenen_US
dc.subjectCyber securityen_US
dc.subjectMachine learningen_US
dc.subjectMalwareen_US
dc.subjectClusteringen_US
dc.subjectCyber attacken_US
dc.subjectEvolutionen_US
dc.titleCOUGAR: A System for Clustering Unknown Malware Using Genetic Algorithm Routinesen_US
dc.date.defence2020-11-12
dc.contributor.departmentFaculty of Computer Scienceen_US
dc.contributor.degreeMaster of Computer Scienceen_US
dc.contributor.external-examinern/aen_US
dc.contributor.graduate-coordinatorMichael McAllisteren_US
dc.contributor.thesis-readerMalcolm I. Heywooden_US
dc.contributor.thesis-readerTami Meredithen_US
dc.contributor.thesis-supervisorNur Zincir-Heywooden_US
dc.contributor.thesis-supervisorFrédéric Massicotteen_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.manuscriptsNot Applicableen_US
dc.contributor.copyright-releaseNot Applicableen_US
 Find Full text

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record