dc.identifier.citation |
[1] AV-TEST Institute, https://www.av-test.org/en/statistics/malware/ [2] Simon Kramer, Julian C. Bradfield,“A general definition of malware”. [3] https://www.malwarebytes.com/malware. [4] James Scott, “Signature Based Malware Detection is Dead”,2017. [5] Andreas Moser, Christopher Kruegel, and Engin Kirda, “Limits of status Analysis for Malware Detection”. [6] Amir Afianian, Salman Niksefat, and Babak Sadeghiyan, “Malware Dynamic Analysis Evasion Techniques : a survey”, 2019. [7] Zane Markel and Michael Bilzor, “Building a Machine Learning Classifier for Malware Detection”, 2014. [8] Junho Choi, Hayoung Kim, Chang Choi, and Pankoo Kim, “Efficient Malicious Code Detection Using N-Gram Analysis and SVM”. [9] Zhongru Wang, Peixin Cong, and Weiqiang Yu, “Malicious Code Detection and Technology Based on Metadata Machine Learning”,2020. [10] Ivan Firdausi, Charles Lim, Alva Erwin, and Anto Satriyo Nugroho, “Analysis of Machine Learning used in behavior-based Malware Detection”. [11] Athiq Reheman Mohammed (&), G. Sai Viswanath, K. Sai babu, and T. Anuradha, “Malware Detection in Executable Files Using Machine Learning”. [12] Nur Syuhada Selamat, Fakariah Hani Mohd Ali, “Comparison of malware detection techniques using machine learning algorithm”. [13] Yuval Elovic, Chanan Gleze and Robert Moskovitch, “Applying Machine Learning Techniques for Detection of Malicious code in network traffic”. [14] Mozammed Chowdhury, Azizur Rahman, Md Rafiqul Islam, “Malware Analysis and Detection using Data Mining and Machine Learning Classification”. [15] https://www.kaggle.com/c/microsoft-malware-prediction/overview 22 [16] Roweida Mohammed, Jumanah Rawashdeh and Malak Abdullah, “Machine Learning with Oversampling and Undersampling Techniques: Overview study and Experimental Results”,2020. [17] https://seaborn.pydata.org/generated/seaborn.heatmap.html [18] Yanli Liu, Yourong Wang, and Jian Zhang, “New Machine Learning Algorithm: Random Forest”, 2012. [19] Arundhati Navada, Aamir Nizam Ansari, Siddharth Patil, Balwant A. Sonkamble, “Overview of use of Decision Tree algorithms in Machine Learning”, 2011. [20] Lishan Wang, “Research and Implementation of Machine Learning Classifier based on KNN”, 2019. |
en_US |
dc.description.abstract |
With the growth of technology, and the exponential amount of data that is being generated, the main challenge is to figure out how to protect this data from unauthorized access. Over the last couple of years, researchers have struggled to come up with a best solution that would handle this problem. The signature-based detection was the standard method used to detect malware. Regrettably, traditional technologies are no longer capable of providing adequate protection. In this work, we proposed a protection system where we trained different models in machine learning to learn from malicious and benign files to allow future prediction. We trained three classifiers in this work, Random Forest, Decision Tree, and KNearest Neighbors on the data. Random Forest gives the best result with an FPR value of 0.0208 and an accuracy of 98%. |
en_US |