Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets

被引:11
作者
Penmatsa, Ravi Kiran Varma [1 ]
Kalidindi, Akhila [1 ]
Mallidi, S. Kumar Reddy [2 ]
机构
[1] MVGR Coll Engn, Vizianagaram, AP, India
[2] Sri Vasavi Engn Coll, Tadepalligudem, India
关键词
Ant Colony Optimization; Feature Optimization; Machine Learning; Malware analysis; Malware classification; Malware detection; Portable Executable (PE) Files; Rough Sets;
D O I
10.4018/IJISP.2020070106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malware is a malicious program that can cause a security breach of a system. Malware detection and classification is one of the burning topics of research in information security. Executable files are the major source of input for static malware detection. Machine learning techniques are very efficient in behavioral-based malware detection and need a dataset of malware with different features. In windows, malware can be detected by analyzing the portable executable (PE) files. This work contributes to identifying the minimum feature set for malware detection employing a rough set dependent feature significance combined with Ant Colony Optimization (ACO) as the heuristic-search technique. A malware dataset named claMP with both integrated features and raw features was considered as the benchmark dataset for this work. The analytical results prove that 97.15% and 92.8% data size optimization has been achieved with a minimum loss of accuracy for claMP integrated and raw datasets, respectively.
引用
收藏
页码:95 / 114
页数:20
相关论文
共 44 条
[1]  
Abou-Assaleh T., 2004, P 2 ANN C PRIVACY SE, P193
[2]  
Acs J., 2018, STATIC DETECTION MAL
[3]  
AJIT, 2016, MALWARE CLASSIFIER D
[4]  
Alkasassbeh M., 2018, CLASSIFICATION MALWA
[5]  
Amro S. A., 2016, INT J COMPUTER INFOR, V9
[6]  
[Anonymous], 2012, P N AM POW S NAPS SE
[7]   Malware methodologies and its future: A survey [J].
Behera, Chandan Kumar ;
Bhaskari, D. Lalitha .
International Journal of Information Security and Privacy, 2017, 11 (04) :47-64
[8]  
Bekerman D., 2015, P IEEE C COMM NETW S, DOI [10.1109/CNS.2015.7346821, DOI 10.1109/CNS.2015.7346821]
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]   Semantics-aware malware detection [J].
Christodorescu, M ;
Jha, S ;
Seshia, SA ;
Song, D ;
Bryant, RE .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :32-46