Concept Relation Logic for Visualizing File Behavior in a Knowledge Representation Model
Praveena Rachel Kamala S1, Justus S2

1Praveena Rachel Kamala S, Research Scholar, Department of Computing Science and Engineering, VIT University, Chennai (Tamil Nadu), India.
2Justus S, Associate Professor, Department of Computing Science and Engineering, VIT University, Chennai (Tamil Nadu), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1732-1740 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7489068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Malware attack is a major problem in cyber security. Malware attack causes problems like slowing down the computer, system crash, continuous display of error messages, shutting down or restarting certain activities, gather personal information or data from the system, redirect the browser, infect the system, spend spam mail and can even be invisible. The badly affected sectors due to cybercrime are movie & video production, commercial banking, health & medical insurance and warehouse clubs & supercentres. The file behavior monitoring method is used to detect the early access stage of malware attack. In this paper, using the Concept Relation Knowledge Representation (CRKR) framework model the file behavior is represented and visualized for monitoring the nature of the file. The aim of this work is to provide effectiveness among complex multiple featured files with uncertain and insufficient data. In this knowledge representation model the proposed Concept Relation Logic enables the features to be correctly placed in the visualization graph which helps in efficiently identifying the malware affected file.
Keywords: Cyber Security, Knowledge Representation, Logic, Malware Attack, Visualization.

Scope of the Article: Plant Cyber Security