Detection of different windows PE malware using machine learning methods

被引:0
作者
Kocak, Aynur [1 ]
Sogut, Esra [2 ]
Alkan, Mustafa [1 ]
Erdem, O. Ayhan [2 ]
机构
[1] Gazi Univ, Fac Technol, Dept Elect & Elect Engn, Ankara, Turkiye
[2] Gazi Univ, Fac Technol, Dept Comp Engn, Ankara, Turkiye
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2023年 / 26卷 / 03期
关键词
Dataset; machine learning; malware; testbed; windows system;
D O I
10.2339/politeknik.1207704
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The types and application areas of cyber attacks are increasing and diversifying. Accordingly, the effects of attacks are constantly increasing or changing every moment. Among the attacks, malware attacks also have diversified and gained a wide place in the cyber world. With the use of different techniques and methods, there are problems in detecting and preventing malware attacks. These problems cause the systems' cyber security not to be fully ensured. Due to these situations, different malware attacks are discussed in the study, and the effects of attacks on Windows security are examined. A test-bed called AyEs has been prepared. Different attacks have been carried out, such as screenshots, vnc, aimed at hijacking or corrupting the victim system. The AyEs dataset was created by listening to the system network packets obtained due to the attacks. The dataset was preprocessed and made suitable for analysis. Machine learning methods such as Naive Bayes, J48, BayesNet, IBk, AdaBoost and LogitBoost were used on the dataset to detect malware attacks. J48 and IBk methods, which were found to provide high performance as a result of the analyzes, were suggested in the study. In this way, detection systems suitable for possible attack situations against Windows systems will be implemented easily and effectively. In addition to attack detection, an active role will be assumed in determining the type of attack.
引用
收藏
页码:1185 / 1197
页数:15
相关论文
共 22 条
  • [1] Al-Janabi M, 2020, INT ARAB CONF INF TE
  • [2] Choudhary Sunil, 2020, 2020 IEEE 1st International Conference for Convergence in Engineering (ICCE), P1, DOI 10.1109/ICCE50343.2020.9290586
  • [3] cs.waikato, Weka 3: Machine Learning Software in Java
  • [4] Portable Executable Malware Classifier Using Long Short Term Memory and Sophos-ReversingLabs 20 Million Dataset
    Diaz, Julianne Alyson
    Bandala, Argel
    [J]. 2021 IEEE REGION 10 CONFERENCE (TENCON 2021), 2021, : 881 - 884
  • [5] Hashim Ali Salah, 2020, IOP Conference Series: Materials Science and Engineering, V928, DOI 10.1088/1757-899X/928/3/032019
  • [6] A Method for Windows Malware Detection Based on Deep Learning
    Huang, Xiang
    Ma, Li
    Yang, Wenyin
    Zhong, Yong
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (2-3): : 265 - 273
  • [7] Irshad A, 2019, 2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), P255, DOI [10.1109/tsp.2019.8768808, 10.1109/TSP.2019.8768808]
  • [8] Malicious XSS Code Detection with Decision Tree
    Kasim, Omer
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (01): : 67 - 72
  • [9] kdd.ics.uci, KDD CUP 1999 data
  • [10] Parameter Extraction of Photovoltaic Models by Honey Badger algorithm and Wild Horse Optimizer
    Koc, Kezban
    Demirtas, Mehmet
    Cetinbas, Ipek
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2023, 26 (04):