A Comprehensive Exploration of Machine Learning and Explainable AI Techniques for Malware Classification

被引:0
作者
Athira [1 ]
Baburaj, Drishya [1 ]
Gupta, Deepa [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci & Engn, Bengaluru, India
来源
2024 2ND WORLD CONFERENCE ON COMMUNICATION & COMPUTING, WCONF 2024 | 2024年
关键词
Malware; Machine Learning; KNN; Random Forest; Decision Tree; XGBoost; AdaBoost; FEATURES;
D O I
10.1109/WCONF61366.2024.10692299
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The rapid evolution of malware presents a significant challenge to cybersecurity, necessitating more effective detection and classification methods. Malware attack is a vulnerable and prevalent threat in cyber security. Awareness about these threats and regular updation of security measures are critical. There are various techniques in which we can detect the malwares and prevent them from occurring. Identification of malware is crucial in this technological era to prevent destruction. In this work, we have used various machine learning classifiers including ensemble techniques such as boosting and bagging classifiers to classify four different types of Android Malwares. Random Forest has outperformed with a F1-score of 88%, and model Explainability has been deployed to reveal the most significant feature.
引用
收藏
页数:7
相关论文
共 17 条
[1]  
Agrawal Prerna, 2021, Data Management, Analytics and Innovation. Proceedings of ICDMAI 2020. Advances in Intelligent Systems and Computing (AISC 1174), P311, DOI 10.1007/978-981-15-5616-6_22
[2]   Malware Detection Using Deep Learning and Correlation-Based Feature Selection [J].
Alomari, Esraa Saleh ;
Nuiaa, Riyadh Rahef ;
Alyasseri, Zaid Abdi Alkareem ;
Mohammed, Husam Jasim ;
Sani, Nor Samsiah ;
Esa, Mohd Isrul ;
Musawi, Bashaer Abbuod .
SYMMETRY-BASEL, 2023, 15 (01)
[3]  
Anderson Hyrum S, 2017, Black Hat
[4]   Cross-validation of machine learning algorithms for malware detection using static features of Windows portable executables: A Comparative Study [J].
Aslam, Warda ;
Fraz, M. M. ;
Rizvi, S. K. ;
Saleem, S. .
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON SMART COMMUNITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEEHONET 2020), 2020, :73-77
[5]  
Borah Parthajit, 2020 IEEE 4 C INF CO, P1
[6]  
Choudhary Sunil, 2020, 2020 IEEE 1st International Conference for Convergence in Engineering (ICCE), P1, DOI 10.1109/ICCE50343.2020.9290586
[7]   Evading Anti-Malware Engines With Deep Reinforcement Learning [J].
Fang, Zhiyang ;
Wang, Junfeng ;
Li, Boya ;
Wu, Siqi ;
Zhou, Yingjie ;
Huang, Haiying .
IEEE ACCESS, 2019, 7 :48867-48879
[8]   Behavior-based features model for malware detection [J].
Galal H.S. ;
Mahdy Y.B. ;
Atiea M.A. .
Journal of Computer Virology and Hacking Techniques, 2016, 12 (02) :59-67
[9]  
Gavrilut Dragos, 2009, Proceedings of the 2009 International Multiconference on Computer Science and Information Technology (IMCSIT), P735, DOI 10.1109/IMCSIT.2009.5352759
[10]  
kaggle, About us