Malware Detection Using Machine Learning Classifiers

Show simple item record

dc.contributor.author Camara, Ahmed
dc.contributor.author Salam, Aanmar Abdou
dc.contributor.author Abdallah, Mefire
dc.date.accessioned 2023-04-03T08:04:44Z
dc.date.available 2023-04-03T08:04:44Z
dc.date.issued 2022-05-31
dc.identifier.citation [1] AV-TEST Institute, https://www.av-test.org/en/statistics/malware/ [2] Simon Kramer, Julian C. Bradfield,“A general definition of malware”. [3] https://www.malwarebytes.com/malware. [4] James Scott, “Signature Based Malware Detection is Dead”,2017. [5] Andreas Moser, Christopher Kruegel, and Engin Kirda, “Limits of status Analysis for Malware Detection”. [6] Amir Afianian, Salman Niksefat, and Babak Sadeghiyan, “Malware Dynamic Analysis Evasion Techniques : a survey”, 2019. [7] Zane Markel and Michael Bilzor, “Building a Machine Learning Classifier for Malware Detection”, 2014. [8] Junho Choi, Hayoung Kim, Chang Choi, and Pankoo Kim, “Efficient Malicious Code Detection Using N-Gram Analysis and SVM”. [9] Zhongru Wang, Peixin Cong, and Weiqiang Yu, “Malicious Code Detection and Technology Based on Metadata Machine Learning”,2020. [10] Ivan Firdausi, Charles Lim, Alva Erwin, and Anto Satriyo Nugroho, “Analysis of Machine Learning used in behavior-based Malware Detection”. [11] Athiq Reheman Mohammed (&), G. Sai Viswanath, K. Sai babu, and T. Anuradha, “Malware Detection in Executable Files Using Machine Learning”. [12] Nur Syuhada Selamat, Fakariah Hani Mohd Ali, “Comparison of malware detection techniques using machine learning algorithm”. [13] Yuval Elovic, Chanan Gleze and Robert Moskovitch, “Applying Machine Learning Techniques for Detection of Malicious code in network traffic”. [14] Mozammed Chowdhury, Azizur Rahman, Md Rafiqul Islam, “Malware Analysis and Detection using Data Mining and Machine Learning Classification”. [15] https://www.kaggle.com/c/microsoft-malware-prediction/overview 22 [16] Roweida Mohammed, Jumanah Rawashdeh and Malak Abdullah, “Machine Learning with Oversampling and Undersampling Techniques: Overview study and Experimental Results”,2020. [17] https://seaborn.pydata.org/generated/seaborn.heatmap.html [18] Yanli Liu, Yourong Wang, and Jian Zhang, “New Machine Learning Algorithm: Random Forest”, 2012. [19] Arundhati Navada, Aamir Nizam Ansari, Siddharth Patil, Balwant A. Sonkamble, “Overview of use of Decision Tree algorithms in Machine Learning”, 2011. [20] Lishan Wang, “Research and Implementation of Machine Learning Classifier based on KNN”, 2019. en_US
dc.identifier.uri http://hdl.handle.net/123456789/1807
dc.description Supervised by Mr. Shohel Ahmed, Assistant Professor, Department of Computer Science and Engineering(CSE), Islamic University of Technology (IUT) Board Bazar, Gazipur-1704, Bangladesh. This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022. en_US
dc.description.abstract With the growth of technology, and the exponential amount of data that is being generated, the main challenge is to figure out how to protect this data from unauthorized access. Over the last couple of years, researchers have struggled to come up with a best solution that would handle this problem. The signature-based detection was the standard method used to detect malware. Regrettably, traditional technologies are no longer capable of providing adequate protection. In this work, we proposed a protection system where we trained different models in machine learning to learn from malicious and benign files to allow future prediction. We trained three classifiers in this work, Random Forest, Decision Tree, and KNearest Neighbors on the data. Random Forest gives the best result with an FPR value of 0.0208 and an accuracy of 98%. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh en_US
dc.subject Malware, Machine Learning, Random Forest, Decision Tree, K-NN,Sampling en_US
dc.title Malware Detection Using Machine Learning Classifiers en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics