Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Melih Abdulhayoglu is active.

Publication


Featured researches published by Melih Abdulhayoglu.


knowledge discovery and data mining | 2017

HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network

Shifu Hou; Yanfang Ye; Yangqiu Song; Melih Abdulhayoglu

With explosive growth of Android malware and due to the severity of its damages to smart phone users, the detection of Android malware has become increasingly important in cybersecurity. The increasing sophistication of Android malware calls for new defensive techniques that are capable against novel threats and harder to evade. In this paper, to detect Android malware, instead of using Application Programming Interface (API) calls only, we further analyze the different relationships between them and create higher-level semantics which require more effort for attackers to evade the detection. We represent the Android applications (apps), related APIs, and their rich relationships as a structured heterogeneous information network (HIN). Then we use a meta-path based approach to characterize the semantic relatedness of apps and APIs. We use each meta-path to formulate a similarity measure over Android apps, and aggregate different similarities using multi-kernel learning. Then each meta-path is automatically weighted by the learning algorithm to make predictions. To the best of our knowledge, this is the first work to use structured HIN for Android malware detection. Comprehensive experiments on real sample collections from Comodo Cloud Security Center are conducted to compare various malware detection approaches. Promising experimental results demonstrate that our developed system HinDroid outperforms other alternative Android malware detection techniques.


ieee international conference semantic computing | 2015

Intelligent malware detection based on file relation graphs

Lingwei Chen; Tao Li; Melih Abdulhayoglu; Yanfang Ye

Due to its damage to Internet security, malware and its detection has caught the attention of both anti-malware industry and researchers for decades. Many research efforts have been conducted on developing intelligent malware detection systems. In these systems, resting on the analysis of file contents extracted from the file samples, like Application Programming Interface (API) calls, instruction sequences, and binary strings, data mining methods such as Naive Bayes and Support Vector Machines have been used for malware detection. However, driven by the economic benefits, both diversity and sophistication of malware have significantly increased in recent years. Therefore, anti-malware industry calls for much more novel methods which are capable to protect the users against new threats, and more difficult to evade. In this paper, other than based on file contents extracted from the file samples, we study how file relation graphs can be used for malware detection and propose a novel Belief Propagation algorithm based on the constructed graphs to detect newly unknown malware. A comprehensive experimental study on a real and large data collection from Comodo Cloud Security Center is performed to compare various malware detection approaches. Promising experimental results demonstrate that the accuracy and efficiency of our proposed method outperform other alternate data mining based detection techniques.


knowledge discovery and data mining | 2018

Gotcha - Sly Malware!: Scorpion A Metagraph2vec Based Malware Detection System

Yujie Fan; Shifu Hou; Yiming Zhang; Yanfang Ye; Melih Abdulhayoglu

Due to its severe damages and threats to the security of the Internet and computing devices, malware detection has caught the attention of both anti-malware industry and researchers for decades. To combat the evolving malware attacks, in this paper, we first study how to utilize both content- and relation-based features to characterize sly malware; to model different types of entities (i.e., file, archive, machine, API, DLL ) and the rich semantic relationships among them (i.e., file-archive, file-machine, file-file, API-DLL, file-API relations), we then construct a structural heterogeneous information network (HIN) and present meta-graph based approach to depict the relatedness over files. To measure the relatedness over files on the constructed HIN, since malware detection is a cost-sensitive task, it calls for efficient methods to learn latent representations for HIN. To address this challenge, based on the built meta-graph schemes, we propose a new HIN embedding model metagraph2vec on the first attempt to learn the low-dimensional representations for the nodes in HIN, where both the HIN structures and semantics are maximally preserved for malware detection. A comprehensive experimental study on the real sample collections from Comodo Cloud Security Center is performed to compare various malware detection approaches. The promising experimental results demonstrate that our developed system Scorpion which integrate our proposed method outperforms other alternative malware detection techniques. The developed system has already been incorporated into the scanning tool of Comodo Antivirus product.


international joint conference on artificial intelligence | 2018

Make Evasion Harder: An Intelligent Android Malware Detection System

Shifu Hou; Yanfang Ye; Yangqiu Song; Melih Abdulhayoglu

To combat the evolving Android malware attacks, in this paper, instead of only using Application Programming Interface (API) calls, we further analyze the different relationships between them and create higher-level semantics which require more efforts for attackers to evade the detection. We represent the Android applications (apps), related APIs, and their rich relationships as a structured heterogeneous information network (HIN). Then we use a meta-path based approach to characterize the semantic relatedness of apps and APIs. We use each meta-path to formulate a similarity measure over Android apps, and aggregate different similarities using multi-kernel learning to make predictions. Promising experimental results based on real sample collections from Comodo Cloud Security Center demonstrate that our developed system HinDroid outperforms other alternative Android malware detection techniques.


knowledge discovery and data mining | 2011

Combining file content and file relations for cloud based malware detection

Yanfang Ye; Tao Li; Shenghuo Zhu; Weiwei Zhuang; Egemen Tas; Umesh Gupta; Melih Abdulhayoglu


Archive | 2008

METHOD AND SYSTEM FOR PERFORMING SECURITY AND VULNERABILITY SCANS ON DEVICES BEHIND A NETWORK SECURITY DEVICE

Melih Abdulhayoglu; Egemen Tas; Igor Seltskiy; Vadim Lvovskiy; Vadim Klimov


Archive | 2007

Method and System of Securely Transmitting Electronic Mail

Shane McGillian; Melih Abdulhayoglu


Archive | 2007

METHOD FOR PROTECTING A COMPUTER AGAINST MALICIOUS SOFTWARE

Melih Abdulhayoglu; Egemen Tas


Archive | 2007

Method and system for protecting a computer against malicious software

Melih Abdulhayoglu; Egemen Tas


Archive | 2011

Method of Image Identification Based on Artificial Intelligence

Melih Abdulhayoglu; Shane McGillian

Collaboration


Dive into the Melih Abdulhayoglu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yanfang Ye

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Shifu Hou

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Tao Li

Florida International University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yangqiu Song

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Lingwei Chen

West Virginia University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge