• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用人工智能和分析技术提升集体智能系统的网络安全和隐私保护。

Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems.

作者信息

Naeem Muhammad Rehan, Amin Rashid, Farhan Muhammad, Alotaibi Faiz Abdullah, Alnfiai Mrim M, Sampedro Gabriel Avelino, Karovič Vincent

机构信息

Department of Computer Science, University of Engineering and Technology Taxila, Taxila, Punjab, Pakistan.

School of Science and Engineering, School of Science and Engineering, Al Akhawayn University in Ifrane, Ifrane, Ifrane, Morocco.

出版信息

PeerJ Comput Sci. 2024 Sep 20;10:e2264. doi: 10.7717/peerj-cs.2264. eCollection 2024.

DOI:10.7717/peerj-cs.2264
PMID:39314701
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11419604/
Abstract

Collective intelligence systems like Chat Generative Pre-Trained Transformer (ChatGPT) have emerged. They have brought both promise and peril to cybersecurity and privacy protection. This study introduces novel approaches to harness the power of artificial intelligence (AI) and big data analytics to enhance security and privacy in this new era. Contributions could explore topics such as: leveraging natural language processing (NLP) in ChatGPT-like systems to strengthen information security; evaluating privacy-enhancing technologies to maximize data utility while minimizing personal data exposure; modeling human behavior and agency to build secure and ethical human-centric systems; applying machine learning to detect threats and vulnerabilities in a data-driven manner; using analytics to preserve privacy in large datasets while enabling value creation; crafting AI techniques that operate in a trustworthy and explainable manner. This article advances the state-of-the-art at the intersection of cybersecurity, privacy, human factors, ethics, and cutting-edge AI, providing impactful solutions to emerging challenges. Our research presents a revolutionary approach to malware detection that leverages deep learning (DL) based methodologies to automatically learn features from raw data. Our approach involves constructing a grayscale image from a malware file and extracting features to minimize its size. This process affords us the ability to discern patterns that might remain hidden from other techniques, enabling us to utilize convolutional neural networks (CNNs) to learn from these grayscale images and a stacking ensemble to classify malware. The goal is to model a highly complex nonlinear function with parameters that can be optimized to achieve superior performance. To test our approach, we ran it on over 6,414 malware variants and 2,050 benign files from the MalImg collection, resulting in an impressive 99.86 percent validation accuracy for malware detection. Furthermore, we conducted a classification experiment on 15 malware families and 13 tests with varying parameters to compare our model to other comparable research. Our model outperformed most of the similar research with detection accuracy ranging from 47.07% to 99.81% and a significant increase in detection performance. Our results demonstrate the efficacy of our approach, which unlocks the hidden patterns that underlie complex systems, advancing the frontiers of computational security.

摘要

像聊天生成预训练变换器(ChatGPT)这样的集体智能系统已经出现。它们给网络安全和隐私保护带来了希望和风险。本研究介绍了利用人工智能(AI)和大数据分析的力量来增强这个新时代的安全性和隐私性的新方法。贡献可能探索诸如以下主题:在类似ChatGPT的系统中利用自然语言处理(NLP)来加强信息安全;评估隐私增强技术以在最小化个人数据暴露的同时最大化数据效用;对人类行为和能动性进行建模以构建安全且符合道德的以人类为中心的系统;应用机器学习以数据驱动的方式检测威胁和漏洞;使用分析方法在大型数据集中保护隐私的同时实现价值创造;设计以可信赖和可解释的方式运行的人工智能技术。本文推进了网络安全、隐私、人为因素、伦理和前沿人工智能交叉领域的技术水平,为新出现的挑战提供了有影响力的解决方案。我们的研究提出了一种革命性的恶意软件检测方法,该方法利用基于深度学习(DL)的方法从原始数据中自动学习特征。我们的方法包括从恶意软件文件构建灰度图像并提取特征以最小化其大小。这个过程使我们有能力辨别其他技术可能无法发现的模式,使我们能够利用卷积神经网络(CNN)从这些灰度图像中学习,并使用堆叠集成来对恶意软件进行分类。目标是用可以优化以实现卓越性能的参数对一个高度复杂的非线性函数进行建模。为了测试我们的方法,我们在来自MalImg集合的6414多个恶意软件变体和2050个良性文件上运行它,恶意软件检测的验证准确率达到了令人印象深刻的99.86%。此外,我们对15个恶意软件家族进行了分类实验,并进行了13次具有不同参数的测试,以将我们的模型与其他可比研究进行比较。我们的模型在检测准确率从47.07%到99.81%的范围内优于大多数类似研究,并且检测性能有显著提高。我们的结果证明了我们方法的有效性,该方法揭示了复杂系统背后隐藏的模式,推进了计算安全的前沿。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/614163e53426/peerj-cs-10-2264-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/571540f6e95b/peerj-cs-10-2264-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/34934f2ce8e9/peerj-cs-10-2264-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/1ffad2c4a2d1/peerj-cs-10-2264-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/ceb6825af80c/peerj-cs-10-2264-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/fda0909159e3/peerj-cs-10-2264-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/614163e53426/peerj-cs-10-2264-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/571540f6e95b/peerj-cs-10-2264-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/34934f2ce8e9/peerj-cs-10-2264-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/1ffad2c4a2d1/peerj-cs-10-2264-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/ceb6825af80c/peerj-cs-10-2264-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/fda0909159e3/peerj-cs-10-2264-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2c1a/11419604/614163e53426/peerj-cs-10-2264-g006.jpg

相似文献

1
Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems.利用人工智能和分析技术提升集体智能系统的网络安全和隐私保护。
PeerJ Comput Sci. 2024 Sep 20;10:e2264. doi: 10.7717/peerj-cs.2264. eCollection 2024.
2
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
3
Transfer Learning for Image-Based Malware Detection for IoT.基于图像的物联网恶意软件检测的迁移学习。
Sensors (Basel). 2023 Mar 20;23(6):3253. doi: 10.3390/s23063253.
4
An Efficient DenseNet-Based Deep Learning Model for Malware Detection.一种基于高效密集连接网络的恶意软件检测深度学习模型。
Entropy (Basel). 2021 Mar 15;23(3):344. doi: 10.3390/e23030344.
5
Generative AI in Medical Practice: In-Depth Exploration of Privacy and Security Challenges.生成式人工智能在医疗实践中的应用:隐私与安全挑战的深入探讨。
J Med Internet Res. 2024 Mar 8;26:e53008. doi: 10.2196/53008.
6
Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation.基于转换器的迁移学习和多模型视觉表示的可解释恶意软件检测系统。
Sensors (Basel). 2022 Sep 7;22(18):6766. doi: 10.3390/s22186766.
7
Unraveling the Ethical Enigma: Artificial Intelligence in Healthcare.解开伦理谜团:医疗保健领域的人工智能
Cureus. 2023 Aug 10;15(8):e43262. doi: 10.7759/cureus.43262. eCollection 2023 Aug.
8
A deep learning approach to direct immunofluorescence pattern recognition in autoimmune bullous diseases.深度学习方法在自身免疫性大疱性疾病中的直接免疫荧光模式识别。
Br J Dermatol. 2024 Jul 16;191(2):261-266. doi: 10.1093/bjd/ljae142.
9
Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.基于多尺度特征融合卷积神经网络的恶意代码变体识别。
Comput Intell Neurosci. 2021 Dec 14;2021:1070586. doi: 10.1155/2021/1070586. eCollection 2021.
10
Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review.利用人工智能增强医疗物联网安全性:全面综述。
Comput Biol Med. 2024 Mar;170:108036. doi: 10.1016/j.compbiomed.2024.108036. Epub 2024 Jan 28.

引用本文的文献

1
Reynolds rules in swarm fly behavior based on KAN transformer tracking method.基于KAN变压器跟踪方法的雷诺兹在群体飞行行为中起主导作用。
Sci Rep. 2025 Feb 27;15(1):6982. doi: 10.1038/s41598-025-91674-w.

本文引用的文献

1
Transfer Learning for Image-Based Malware Detection for IoT.基于图像的物联网恶意软件检测的迁移学习。
Sensors (Basel). 2023 Mar 20;23(6):3253. doi: 10.3390/s23063253.
2
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.基于卷积神经网络微调随机森林投票的物联网恶意软件新型检测与多分类方法。
Sensors (Basel). 2022 Jun 6;22(11):4302. doi: 10.3390/s22114302.
3
A Modified ResNeXt for Android Malware Identification and Classification.一种用于 Android 恶意软件识别和分类的改进型 ResNeXt。
Comput Intell Neurosci. 2022 May 20;2022:8634784. doi: 10.1155/2022/8634784. eCollection 2022.
4
Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.数字取证在恶意软件分类中的应用:一种从二进制代码到像素向量转换的方法。
Comput Intell Neurosci. 2022 Apr 21;2022:6294058. doi: 10.1155/2022/6294058. eCollection 2022.
5
Malware homology determination using visualized images and feature fusion.使用可视化图像和特征融合进行恶意软件同源性判定。
PeerJ Comput Sci. 2021 Apr 15;7:e494. doi: 10.7717/peerj-cs.494. eCollection 2021.