Reputation Based Malware Detection Using Support Vector Machine

被引:0
|
作者
Kalshetti, Urmila [1 ]
Singh, Prashant [1 ]
Bhapkar, Vaibhav [1 ]
Gaikwad, Manish [1 ]
Bhat, Arvind [1 ]
机构
[1] Savitribai Phule Pune Univ, Pune 411009, Maharashtra, India
来源
INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018 | 2019年 / 26卷
关键词
Dynamic analysis; Machine learning algorithms; Malware detection; Static analysis; Support vector machine; User interface;
D O I
10.1007/978-3-030-03146-6_156
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The idea behind this paper is to make faster predictions with low false positive rate in malware detection. We intend to create a trust level between computers on the network using a system of reputation score. Reputation score is employed to indicate health score of specific machine on the network. A machine with low reputation score indicates malicious machine and a machine with high reputation score indicates healthy machine. The files having source of a low reputation machine are discarded whereas files of machine with high reputation score are further processed by an open source sandbox and Support Vector Machine is employed on its behavioral log to identify the threat. If file is malicious then the source machine reputation score is decreased otherwise it is increased. The data is stored in a database as a machine address, reputation score mapping.
引用
收藏
页码:1338 / 1344
页数:7
相关论文
共 50 条
  • [1] Support Vector Machine Based on Incremental Learning for Malware Detection
    Zhuang Weiwei
    Xiao Lei
    Cui JianFeng
    Zhuang WeiChuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 204 - 207
  • [2] Collaborative Support Vector Machine for Malware Detection
    Zhang, Kai
    Li, Chao
    Wang, Yong
    Zhu, Xiaobin
    Wang, Haiping
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS 2017), 2017, 108 : 1682 - 1691
  • [3] A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
    Dong, Dawei
    Ye, Zhiwei
    Su, Jun
    Xie, Shiwei
    Cao, Yu
    Kochan, Roman
    15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 2020, : 846 - 851
  • [4] Hybrids of support vector machine wrapper and filter based framework for malware detection
    Huda, Shamsul
    Abawajy, Jemal
    Alazab, Mamoun
    Abdollalihian, Mali
    Islam, Rafiqul
    Yearwood, John
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 376 - 390
  • [5] Malware Detection Using Perceptrons and Support Vector Machines
    Gavrilut, Dragos
    Cimpoesu, Mihai
    Anton, Dan
    Ciortuz, Liviu
    2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS, 2009, : 283 - 288
  • [6] Support vector machines and malware detection
    Singh, Tanuvir
    Di Troia, Fabio
    Corrado, Visaggio Aaron
    Austin, Thomas H.
    Stamp, Mark
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (04): : 203 - 212
  • [7] Support Vector Machine for malware analysis and classification
    Kruczkowski, Michal
    Niewiadomska-Szynkiewicz, Ewa
    2014 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 2, 2014, : 415 - 420
  • [8] A Machine Learning Based Adult Content Detection Using Support Vector Machine
    Gajula, Ganesh
    Hundiwale, Ajinkya
    Mujumdar, Shreyas
    Saritha, L. R.
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 181 - 185
  • [9] Induction machine fault detection using support vector machine based classifier
    Ghate, V.N.
    Dudul, S.V.
    WSEAS Transactions on Systems, 2009, 8 (05): : 591 - 599
  • [10] Hybrid Intelligent Android Malware Detection Using Evolving Support Vector Machine Based on Genetic Algorithm and Particle Swarm Optimization
    Ali, Waleed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (09): : 15 - 28