Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System

As the planet watches in shock the evolution of the COVID-19 pandemic, new forms of sophisticated, versatile, and extremely difficult-to-detect malware expose society and especially the global economy. Machine learning techniques are posing an increasingly important role in the field of malware identification and analysis. However, due to the complexity of the problem, the training of intelligent systems proves to be insufficient in recognizing advanced cyberthreats.*e biggest challenge in information systems security using machine learning methods is to understand the polymorphism and metamorphism mechanisms used by malware developers and how to effectively address them. *is work presents an innovative Artificial Evolutionary Fuzzy LSTM Immune System which, by using a heuristic machine learning method that combines evolutionary intelligence, Long-Short-Term Memory (LSTM), and fuzzy knowledge, proves to be able to adequately protect modern information system from Portable Executable Malware. *e main innovation in the technical implementation of the proposed approach is the fact that the machine learning system can only be trained from raw bytes of an executable file to determine if the file is malicious.*e performance of the proposed system was tested on a sophisticated dataset of high complexity, which emerged after extensive research on PE malware that offered us a realistic representation of their operating states. *e high accuracy of the developed model significantly supports the validity of the proposed method. *e final evaluation was carried out with in-depth comparisons to corresponding machine learning algorithms and it has revealed the superiority of the proposed immune system.


Introduction
Critical sectors, such as transport, energy, health, education, and the financial sector, are increasingly dependent on digital technologies for their core business functionalities [1]. Although digitalization offers enormous opportunities and solutions to many of the challenges of modern society, it significantly exposes the economy and society to widespread cyberthreats, most of which are implemented with specialized forms of malware [2].
Malware development is quite organized with constant innovation, and sophisticated techniques are constantly being developed to bypass even the most advanced digital security systems. Due to the great popularity of the Windows operating system, Portable Executable (PE) files have been at the center of the efforts of organized cybercrime groups for several years now [3]. PEs are executable file formats or object code such as .exe, .dll, .sys, .ocx, and .drv, used in 32/ 64-bit versions of the Windows operating system. eir format is essentially a data structure that encapsulates all the information required by the Windows loader to manage and execute the executable code contained in each file. e PE archetype consists of a set of headers and segments of the dynamic linker on assigning the file to memory. An executable string consists of several regions, each of which has different memory protection requirements [4]. Figure 1 shows the basic structure of PE programs.
Since the PE format was not designed to be resistant to modification, it is relatively easy to tamper them for malicious or improper use. Malware developers usually use sophisticated polymorphism and metamorphism techniques to obscure their malicious intentions. e main difference between polymorphic and metamorphic viruses is that the polymorphic virus is encrypted using a variable encryption key so that each copy of the virus looks different, while the metamorphic virus rewrites its code to make each copy different, without the use of an encryption key [5]. Packing or obfuscation techniques are also widely used to greatly complicate the analysis of infected PE files with polymorphic or metamorphic viruses.
To investigate possible infected PE files, either static analysis, i.e., examination of the file without being executed, or dynamic analysis, i.e., execution of the file to extract information and reveal its behavior, is performed. After analyzing an executable PE and extracting appropriate attributes, special techniques must be applied to detect the intent of the file, so that it can be properly categorized. e various methods for the above detection are through either a signature-based process for comparing and detecting distinct patterns in an updated database of known malware or detection based on a behavior-based process, thus calculating behavioral parameters including elements such as sender addresses and recipient, attachment types, and various other measurable statistical features [6].
Signature-based processes are considered obsolete and only used as an auxiliary method while achieving efficient detection of malicious PE files is equal to the process of analyzing a huge amount of data to identify the behavioral patterns of each malware family, to group them in separate similar categories. is categorization with clearly defined and sufficient criteria is of particular interest, as the detection is more difficult and complex and also requires advanced technical knowledge and experience to understand the malicious behavior of the infected files [7]. erefore, a significant part of the research community of information systems security and machine learning has turned its attention to malware classification using specialized methodologies and advanced techniques for modeling PE file behavior. e rest of the work includes Section 2 that gives a detailed description of the proposed Artificial Evolutionary Fuzzy LSTM Immune System, a related work section, and Methodology section which describes in detail the methodology of the proposed system, while Experiments section explains the data used and the scenarios taken into account for the implementation of the proposed system. Finally, Conclusions section summarizes the research conducted and presents the future objectives that extend it.

The Proposed Artificial Evolutionary Fuzzy LSTM Immune System
As mentioned, malware detection from the current generation of antimalware products typically uses a signaturebased approach, where a set of rules attempts to detect different groups of known types of malware. ese rules are very specific; they are generally fragile and usually cannot detect new or transformed malware even if it uses the same functionality. Instead, the proposed architecture introduces an advanced methodology for distinguishing between benign and malicious PE executable files for Windows OS,  taking as input only the raw byte sequence of the files under investigation [3,4,8].
is approach has several practical advantages as it does not require complex hand-crafted features or specialized knowledge of how it is used to compile the way the malware is working. is means that, from the point that the model is properly trained, it can generalize new threats and at the same time be resistant to variants of malware that may result from polymorphism or metamorphism. Also, the computational complexity depends linearly on the length of the examined sequence (binary size), which means that the classification can be done relatively quickly and can work even in very large files [9]. It is also interesting that the analysis can be done in sections or subsections of the binary code, which makes the approach adaptable to new or similar file formats, which may come from different compilers and implementation architectures.
But the most basic and essential feature in dealing with polymorphic malicious files is the fact that the contents of a binary code at the operational level can be arbitrarily rearranged with small effort, but there is a complex spatial correlation between their functions due to system call functions and jump commands [10,11]. us, this analysis can lead to the detection and successful categorization of code that has undergone polymorphism or metamorphism techniques that are used by malware developers and are particularly difficult to detect by existing methodologies. e main innovation of the proposed immune system is the fact that it can only be trained from raw bytes of an executable file to determine if the file is malicious. However, there are many additional challenges. Specifically, treating each byte as a unit in an input sequence means that a sequence classification problem of the order of thousands to millions of time steps is created. is goes far beyond the length of data entry into sequence classifiers. Also, bytes in malware can have a lot of information details. Any byte received could encode the human-readable text, binary code, or arbitrary objects such as images, audio, etc. In addition, some of this content may be encrypted [12,13].
But the most important problem is that sequence allocation in individually processed cases will not work, as malware indexes can be sparse and distributed throughout the file, so there is no way to map global tags for a training set (file) in later phases without importing too much noise. In addition, having only one label for thousands or millions of time steps of an input sequence with sparse distinctive features creates an extremely difficult machine learning problem due to the very weak training signal [14].
To address the above challenges in this work, an innovative Artificial Evolutionary Fuzzy LSTM Immune System is proposed, which is inspired by the way the body reacts to the appearance of a pathogen and mimics, at a higher, abstract level, the general framework of the immune system, combining evolutionary intelligence, medium-term memory, and fuzzy knowledge to detect Portable Executable Malware (PEM).
In artificial intelligence, Artificial Immune Systems (AIS) are a class of computationally intelligent, rule-based machine learning systems inspired by the principles and processes of the vertebrate immune system. e algorithms are typically modeled after the immune system's characteristics of learning and memory, for use in problem solving. AIS are distinct from computational immunology and theoretical biology that is concerned with simulating immunology using computational and mathematical models towards better understanding the immune system, although such models initiated the field of AIS and continue to provide a fertile ground for inspiration. In any case, a detailed explanation of how exactly the vertebrate immune system operates, is necessary in order to understand the proposed system.
When a virus enters the human cells, some of its protein fragments (peptides) bind to the Major Histocompatibility Complexes (MHC) molecular system. MHC genes are highly polymorphic and encode cell membrane protein molecules (antigens), which show structural and functional similarities. Lymphocytes, as specific cells of the immune system, undertake the task to recognize the virus. To achieve the identification of virus-infected cells, lymphocytes must have specific receptors to bind to the antigens (peptides) that bind to the MHC, so that at their cross-linking, they produce an immune response which translates into specific cytotoxic processes that kill infected cells. e immune response focuses on the production of specific antibodies that are produced by a chemical immune response, while at the same time clones of specific lymphocytes are produced that activate the cellmediated immune response. Both antibodies and lymphocytes recognize certain virus proteins (antigens), bind to them, and either inactivate the virus itself (neutralizing antibodies) or kill the virus-infected cells [15]. e proposed algorithm does not attempt to model exactly the above mechanism of the immune system, but borrows some of its features, in particular, the theory of clone selection and immune network. e recursion process will allow detecting polymorphism and metamorphism malware.
It establishes the idea that it is worth cloning only the lymphocytes that better recognize the pathogen, to create a large number of antibodies that will largely match specific antigens, significantly enhancing the role of memory antibodies. Antibodies are considered to be the possible solutions, antigens are the test data, and the degree of similarity between an antibody and an antigen represents the quality of the solution.

Literature Review
e basic principles of inspiration that AIS [16,17] try to simulate, are the ability of the natural immune system to acknowledge normal cells, to distinguish the normal from the foreign, to be able to accurately characterize whether a foreign cell is harmful or not, to use lymphocyte cloning and mutation to adapt to the foreign cells that the body is dealing with, and to react directly to foreign molecules expressed by a pathogen that triggers the immune system response (antigens) that the body has already experienced, an action which is due to memory cells [18].
Also, a very important feature that provides inspiration and tries to be modeled by AIS concerns the multiple levels, the defense-in-depth, and the cover overlap of defense of the natural immune systems. A simple example of capturing these characteristics is the way the skin of living organisms' works [17]. e first line of defense is the skin, nasal hairs, etc., which essentially block the absorption of pathogens such as foreign particles, viruses, bacteria, fungi, etc. is zone is reinforced by feedback mechanisms like tears, saliva, sweat, and tears which strengthen the normal defense, by removing pathogens from the body or containing digestive enzymes [19].
Another important feature that AIS tries to model is the combination of innate and acquired immunization [20]. e innate immune system uses several molecular patterns to identify pathogens; it exists from birth and does not adapt during the life of living organisms. e acquired immune system, on the other hand, is the creation of the body's exposure to pathogens and the retrieval of the history of invaders and how they can be treated. In case a pathogen tries to invade the organism, a combined action takes place between the innate and the acquired immune system to deal with the invasion [16,21]. e immensely valuable physical ability of the immune system to distinguish between different cells and locate and often eradicate the infected has inspired researchers in the field of information systems security to create corresponding mechanisms that could diversely enhance the active security of these systems [22].
A summarization with the most well-known immune methods that can be extracted from literature is presented in Table 1.
Over the past years, researchers have tried to combine the features of Artificial Immune Systems (AIS) with cybersecurity and more specifically to find malware. Also malware detection and more specifically Portable Executable Malware and the process of differentiating it from benign programs pose a significant research field for security researchers. In this section, we present some studies in both fields [23].
Fernandes et al. [21] made a survey of the applications of AIS to computer security. e article introduces the principles of Artificial Immune Systems and surveys several works applying such systems to computer security problems.
is work pointed to the open issues afterward, elaborating on the novel applicability of these systems to cloud computing environments. Also, Aldhaheri et al. [10] proposed a novel Deep Learning and Dendritic Cell Algorithm based IDS framework (DeepDCA), to identify IoT intrusion and minimize the false alarm generation. In addition, Tabatabaefar et al. [22] proposed an AIS based intrusion detection system to achieve higher precision in intrusion detection. In this scheme two sets of antibodies-positive and negative-are generated for normal and attack samples, respectively, using negative selection and positive selection theories in primary detectors' generation. e simulation showed that the proposed algorithm achieved 99.1% true positive rate while the false positive rate is 1.9%.
Kumar et al. [4] proposed a novel derived feature engineering technique that improves the performance of a machine learning-based classifier for malicious PE file detection [24,25]. e proposed technique used static analysis techniques to extract the features which have lower time and resource requirement than dynamic analysis. And finally, Vyas et al. [8] investigated static feature-based malware detection by using different supervised learning algorithms and proposed a network malware detection process for real-time malware detection on the network. ey targeted malicious PE file detection with a small number of features and investigated how much they could push the supervised learning techniques towards malware detection while minimizing the computational cost for network malware detection. is research explored four supervised techniques: Decision Tree, k-NN, SVMs, and Random Forests for malware detection using the constructed 28 static features. Techniques were evaluated on four types of malware: backdoor, virus, trojan, and worm.

Methodology
is paper proposes a novel method to understand the polymorphism and metamorphism mechanisms used by malware developers and how to effectively address them. e forecasting approach provides insights of the way of the evolution of malware practices and can facilitate decisionmaking and management of security strategies. e determination achieved by the proposed model is indicative of its effectiveness and reliability to the extent that it incorporates fitting techniques of high resolution with latent information being visible after transforming the PE file into a raw code. e proposed Artificial Evolutionary Fuzzy LSTM Immune System is presented in Figure 2. e flow procedure is generally described as follows [15-17, 21, 22, 26, 27].

Initialization.
During initialization, all the elements of the data set that the algorithm receives as input are normalized in such a way that the Euclidean distance between any two elements of the data set is in the interval [0, 1]. Let D be the set containing the data to be classified and x, y ∈ D where x, y ∈ R; then, the distance is defined as e data set D consists of x classes of size W, with the training set T being a subset of a class of D and used to train the elements of this class so that 4 Security and Communication Networks e algorithm then calculates the affinity threshold, i.e., the average value of the distances between the elements of the training set, as follows: Aff Thr � n i�1 n j�i+1 aff ag i , ag j (n(n − 1))/2 , whereaff(x, y) � ‖x − y‖ norm .
e final stage of this phase is the initialization of the set of memory antibodies and the set of available antibodies.

Antibody Set Initialization.
For each a i ∈ P, 1 ≤ i ≤ |P|, antibody a random sequence of s i ∈ L symbols is selected and assigned to it, a i ←s i . e set G r ∈ L: G r � G is also defined. e set of memory antibodies for each class is initialized to the current antigenic template from the same template class or a set of antigenic templates from the same template class.

Antigen
Presentation. An ag ∈ G r , 1 ≤ i ≤ |G r | antigen is randomly selected and presented to the population, while at the same time the binding function f is calculated for each antibody in the population. e following set is thus obtained: the degree of binding of each antibody in the population with the ag antigen. e ag antigen is removed from G r so G r ←G r − ag .

Determination of Compatible Memory
Antibody. e algorithm is one-shot; i.e., it examines one element (antigen) at a time. e first step is to identify a compatible memory antibody from the set of memory antibodies. Let ag be an antigen from the training set; identify the mc match memory antibody that exhibits the greatest degree of stimulation relative to the current ag antigen. mc match � argmax mc ∈ MC ag·c stim(ag, mc)όπoυstim(x, y) � 1 − ‖x− y‖ norm .
us mc match is the memory antibody that is less distant from the ag antigen. If the set of memory antibodies of this template class is empty, i.e., MC ag·c � ∅, then the mc match ←ag; i.e., the mc match is the antigenic template itself and thus is placed inside the set of memory antibodies.

Identification of Candidate Antibody.
e candidate vector for memory is the characteristic vector that exhibits the greatest degree of stimulation relative to the current antigenic pattern, called mc candidate .

Antibody Production.
e mc match memory antibody that exhibits the highest degree of stimulation to the current antigenic standard ag is used as the archetype to produce a set of mutated versions of the original. ese antibodies will be included in all available antibodies to address the polymorphism and metamorphism mechanisms used in malware development.
e rate of mutation is inversely proportional to the degree of stimulation to the current antigenic pattern.

Antibody Selection.
Based on the data of a set V, the n b antibodies are selected that indicated the best binding quality and now constitute the set B, |B| � n b .

Amplification/Cloning.
Based on the quality of its binding to the antigen ag, each antibody of set B is cloned, with each antibody yielding more clones depending on its quality. A new set C includes the resulting clones.

Clone Maturation.
Each element c j of set C changes at an a j rate which depends on the degree of binding of clone c j to the antigen ag. e better the binding quality, the lower the rate of mutation so that no reversible changes are made to the antibody [28,29]. e set of mutant clones composes the set C m .

Clone Selection and Memory Refresh.
e function f is applied to each element of the set C m and the set V ′ is obtained which contains the connection quality of each mutated clone, V ′ � v j ′ : v j ′ � f(c j ′ , g i ), 1 ≤ j ≤ |C m | . Based on V ′ the n m best clones are selected which constitute the set B ′ . Imaging K is then applied to the g i antigen to obtain the M i set of memory antibodies that are candidates for replacement. Based on the memory renewal policy followed by the algorithm, a final set of M i ′ cells is obtained such that n m � |M i ′ | ≤ |Μ i |. e memory cells of the set M i ′ will be replaced by other selected cells if and only if these cells show a better quality of connection, which means that the condition f(m, g i ) < f(a, g i ), m ∈ M u ′ , a ∈ B ′ , must apply [30].

Introduction of Memory
Antibodies. Affinity threshold is used as a criterion for placing mc candidate in the set of memory antibodies if its degree of stimulation, in terms of the current antigenic standard, is higher than that of mc match . If this is the case, then aff mc candidate , mc match � mc candidate − mc match � � � � � � � � norm , (4) and then mc candidate is placed in the memory antibody set and replaced by mc match .

Training
Procedure. e training procedure is repeated until the average degree of stimulation of all available antibodies is less than a predetermined value. is step of the algorithm aims to generate antibodies that better recognize the current antibody.

Resource Allocation.
For each element of the set of available antibodies, a portion of the total system resources is committed depending on the degree of stimulation of the current antigenic pattern.

Suppression of Available Antibodies.
ose antibodies that bound the smallest part of the total system resources are deleted.

Production of Mutant Offspring.
e subset of available antibodies that have secured most of the system's resources has an additional opportunity to produce mutant progeny.

Population Renewal.
To maintain population diversity, either n t cells are selected from the set V ′ and introduced into the population replacing some others, or n d worse cells from the P population are selected and replaced with completely new ones.

Classification.
e k-NN classifier with Self-Adjusting Memory (k-NN SAM) is used for classification [31][32][33]. e k-NN SAM algorithm is inspired by the field of human memory research and specifically by the dual model of shortterm and long-term memory (STM & LTM). e information that reaches the STM through the sensory organs is accompanied by relevant knowledge derived from the LTM. e information that receives a lot of attention and is considered important is transferred to LTM in the form of Synaptic Consolidation. STM capacity is quite limited and information is retained for a very short time, unlike LTM, which can retain information for several years. A typical example of how human memory works in this field is the fact that we never forget the way we ride a bike, no matter how many years have passed since our last bike ride. e architecture of k-NN SAM is partly inspired by this model, presenting proportions such as the obvious separation of short-term and long-term memory, the different retention times between memories, and the transfer of knowledge from STM to LTM and vice versa. e implementation of this algorithm as a categorization model is based on the general assumption that the new data is more relevant to the current predictions, but prior knowledge is also required for their correct classification. e optimal combination of the two processing levels can minimize errors and increase categorization accuracy M LT retains all former information, which does not conflict with that of M ST . Unlike M ST , M LT is not a continuous part of the data stream, but a set of points p: e association of both memories is the M M memory: Each set includes the weighted k-NN classifier: e k-NN function assigns a label to a given point x based on a set Z � (x i , y i ) ∈ R n × 1, . . . , c { }∨i � 1, . . . , n : where d(x i , x) is the Euclidean distance between two points and the N k (x, Z) returns the set k of x ′ s nearest neighbors to Z. Generally speaking, the LSTM function is capable of learning order dependence in sequence prediction patterns [34]. Each one of the 3 types of the gate in a LSTM cell, forget gate, input gate, and output gate (M ST , M LT , and M M ), will decide what portion of the older data have to be forgotten, what portion of newer data have to be remembered, and what portion of the memory has to be given out correspondingly [35]. e main reason we used the LSTM function is that the contents of a binary at the function level can be arbitrarily rearranged with little effort in cases of polymorphism and metamorphism, but there is always a complicated spatial correlation across functions due to function calls and jump commands which can be identified by a recurrent model.

Termination Condition.
If G r ≠ 0, then the algorithmic procedure is repeated from the second step of the antigen presence. Otherwise, some criterion of convergence of memory antibodies M with the antigens of set G is checked. In the case of unsuccessful convergence, G r ← G and the algorithm is repeated from the second step of the antigen presence then, wherein in the opposite case G r � 0 and thus the algorithm terminates and a generation of evolution is completed.

Polymorphic Mutation.
Antibodies involved in the treatment of polymorphism and metamorphism mechanisms used by malware developers are initialized through Gibbs sampling [36,37]. Gibbs sampling is a Markov Monte Carlo chain algorithm that takes repeated samples from the target p distribution, taking into account all other variables [38]. e basic idea is simple: instead of calculating in detail the quantities we are interested in, with complex posterior distributions, we simulate a sample of values from a suitable Markovian chain that is in equilibrium. So we can calculate the characteristics we want (average value, dispersion, etc.) through the corresponding values of the sample.
e Gibbs sampler simulates observations from multidimensional target distributions through their fully bound distributions, which in our case have a known form. us, the problem of simulating observations from a large-dimensional target distribution is transformed into a problem of simulating observations from smaller dimensional distributions [39].
After defining the set of antibodies by the above procedure (Algorithm 1), assign each point x (i) of the data set to some possible solution C k so that the function Score(C, D) is maximized or minimized on a case-by-case basis. e equation of calculating the function is given as follows: where c k � (1/n k ) x∈c k x and d(x, y) � ‖x − y‖ 2 . e probability of classification error is where P B is the optimal Bayesian error which expresses the probability that c is the value of the dependent variable C based on the values x�(x 1 , x 2 , ..., x n ) of the attributes X�(X 1 , X 2 ,..., X n ) and is given by the relation [40] P(c∨x) � P(c) · n i P x i ∨c .
In this way, vague sets of solutions are created. is is a more realistic categorization of elements with fuzzy boundaries, where the transition from the category of X elements belonging to the fuzzy set A to the category of X Security and Communication Networks elements that do not belong to A is not abrupt-clear but is gradual-vague. Among the created fuzzy sets, operations can be performed on a case-by-case basis as follows (μ is called the membership function of the fuzzy set) [41]: e use of fuzzy sets arises from the fact that learning techniques are designed for stable environments, in which training and testing data are considered to be generated from the same (possibly unknown) distribution. A properly designed and implemented binary code corresponding to a modified pattern may come from a slightly differentiated malware and it can lead the algorithm to make a wrong classification decision. e fuzzy set theory permits the gradual assessment of the membership of elements in a set; this is described with the aid of a membership function valued in the real unit interval [0, 1] [42]. From this point of view, it helps in understanding the dynamic environment and offers a range of adequate explanations that could occur as part of the human decision-making process [43].

Experiments
A set of 19,620 PE files was used to test and validate the proposed system, of which 11,084 were benign files from a clean install of Microsoft Windows and some commonly installed applications, while the remaining 8,536 files were PEM that came from the most updated VirusShare database [44]. All experiments were performed in the Google Colab [45] environment using a Tesla P100 GPU, using the Tensorflow library. To achieve timely model convergence, it was necessary to train the proposed system using a relatively small but at the same time satisfactory batch size, which after extensive trial and error tests resulted in 872 samples. Due to overuse of memory, this required the use of parallel model training using all available GPU memory. e results of the process are presented in the table below and the corresponding diagrams. Specifically, the most popular evaluation measures, which can clearly and objectively identify the proposed system with extensive comparison with other machine learning algorithms, are presented in Table 2 [46]: e Correctly Classified Instances, i.e., the accuracy of the procedure, was calculated at 98.59%, which essentially expresses the percentage of classification of the plots of PE samples that were checked and that are correctly categorized. Only 276 files, i.e., 1.41%, were categorized incorrectly, a fact that is interpreted as 0.014 false positive rate, with a corresponding 0.986 true positive rate. Figure 3 depicts the confusion matrix that provides the accurate and aggregate information needed to evaluate the model [46].
In particular, information for a more complete understanding and evaluation of the process, concerning the unique number of performance measures that can be expressed about the number of true positive, true negative, false positive, and false negative classifications, is presented in Figure 4, with the display of Precision, Recall, and F1-Score for each class separately [46]. e most important measurement for evaluating the performance of the model is the ROC area, which gathers information about the prediction quality of the categorizer for different threshold values while remaining independent of the possible class imbalance in the data. e very high ROC area rating (with Weighted Average of 0.987, i.e., very close to 1), as shown in Figure 5 below, corresponds to the successful ranking of most malicious programs [46].
A visualization of the Precision, Recall, and F1-Score, concerning the classifier discrimination threshold, is shown in Figure 6. e discrimination threshold depicts how the system ranks a PE in the positive order versus the negative order. Generally, this is usually set at 50%, but in this case, the threshold was set to 48% to increase the sensitivity to false positives based on the queue rate, i.e., the percentage of files to be checked [46].
Finally, additional diagrams showing the quality of the proposed model are presented in Figures 7-9 [46].
Making a general assessment of the process proposed and evaluated in this study, we demonstrated the categorizer's ability to differentiate between benign and malicious PE files with high accuracy and with the same importance given to each one, without any unwanted bias, which is most often the result of bad categorizers that cannot generalize. It is also important to note that very accurate process Initialize x (t) � (x (t) 1 , . . . , x (t) k )fort � 0 For t � 0, 1, . . . Pick index i uniformly at random from 1, . . . , k Draw a sample a p( ALGORITHM 1: Polymorphic mutation algorithm.
predictions encourage the use of the model, as the manual analysis of a single binary PE file by a dedicated malware researcher can take more than 10 hours. us, in the proposed way, the process is significantly simplified and accelerated, which makes this method capable of being used in forensic investigations, where a fast and valid assessment of malicious actions is required.

Conclusions
e proposal of the present work is about a method of malware detection inspired by the effectiveness of the immune system. e implementation of the method is based on the fact that minimal effort has been made to utilize biologically inspired machine learning in polymorphic and metamorphic malicious classification problems. e aim of the proposed Artificial Evolutionary Fuzzy LSTM Immune System is to produce multiple identical solutions, to increase the algorithm classification accuracy into various malicious patterns, which result from polymorphism or metamorphism. It is a hybrid system that optimally combines evolutionary intelligence, medium-term memory, and fuzzy knowledge to analyze and classify Portable Executable Malware. e proposed immune system is trained to differentiate between benign and malicious Windows executable files with only the raw byte sequence of the executable as input.
is approach has several practical advantages [47]: (1) No hand-crafted features or knowledge of the compiler used is required. is means the trained model is generalizable and robust to natural variations in malware. (2) e computational complexity is linearly dependent on the sequence length (binary size), which means inference is fast and scalable to very large files. (3) Important subregions of the binary can be identified for forensic analysis. (4) is approach is also adaptable to new file formats, compilers, and instruction set architectures.
e main innovation of the proposed algorithmic method is the detectors that successfully detect malicious patterns and which are placed in long-term memory so that, in this way, the set of detectors creates a different distribution of the set of successful training. Essentially, the problem of dealing with polymorphism and metamorphism mechanisms is modeled as a problem of optimizing the distance of the set of detectors with the objects of the training set. e function to be optimized is a function of the distance of the detectors to the objects of the training set.
Similarly, a key innovation in technical implementation is the challenge of whether a machine learning system could only be trained from raw bytes of an executable file to determine if the file is malicious. is success could greatly simplify the tools used to detect malware, improve detection accuracy, and detect obscure but important malware features. We are convinced that this article proves that detecting malware from raw byte sequences has unique and challenging properties that make it a fertile research field for the machine learning community. e algorithm implemented can be the basis for several future extensions. More specifically, some extensions and variations to the classification algorithm could be applied to investigate system behavior in cases of adversarial examples. e function could also be investigated by adding predefined weight tables containing weights depending on the weight of  Training score Cross validation score the feature in the classification process, to implement the proposed system faster and more quickly. An additional feature that could be added to the classification algorithm is a function for transferring data to even larger dimensions to create different correlations between data and categorization patterns. Finally, another point of research could be the addition of a feature reduction process for the more efficient operation of the proposed Artificial Evolutionary Fuzzy LSTM Immune System.

Data Availability
e data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding the publication of this paper.