An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques

被引:7
作者
Albishry, Nabeel [1 ]
AlGhamdi, Rayed [1 ]
Almalawi, Abdulmohsen [2 ]
Khan, Asif Irshad [2 ]
Kshirsagar, Pravin R. [3 ]
Debtera, Baru [4 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 21589, Saudi Arabia
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Comp Sci Dept, Jeddah 21589, Saudi Arabia
[3] GH Raisoni Coll Engn, Dept Artificial Intelligence, Nagpur, Maharashtra, India
[4] Addis Ababa Sci & Technol Univ, Dept Chem Engn, Coll Biol & Chem Engn, Addis Ababa, Ethiopia
关键词
MACHINE LEARNING TECHNIQUES;
D O I
10.1155/2022/5061059
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Malware has grown in popularity as a method of conducting cyber assaults in former decades as a result of numerous new deception methods employed by malware. To preserve networks, information, and intelligence, malware must be detected as soon as feasible. This article compares various attribute extraction techniques with distinct machine learning algorithms for static malware classification and detection. The findings indicated that merging PCA attribute extraction and SVM classifier results in the highest correct rate with the fewest possible attributes, and this paper discusses sophisticated malware, their detection techniques, and how and where to defend systems and data from malware attacks. Overall, 96% the proposed method determines the malware more accurately than the existing methods.
引用
收藏
页数:13
相关论文
共 30 条
[1]   Automated Analysis Approach for the Detection of High Survivable Ransomware [J].
Ahmed, Yahye Abukar ;
Kocer, Baris ;
Al-rimy, Bander Ali Saleh .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (05) :2236-2257
[2]  
Akojwar SG., 2016, WSEAS trans. electron, V7, P79
[3]   A Comprehensive Review on Malware Detection Approaches [J].
Aslan, Omer ;
Samet, Refik .
IEEE ACCESS, 2020, 8 :6249-6271
[4]   Metamorphic malicious code behavior detection using probabilistic inference methods [J].
Choi, Chang ;
Esposito, Christian ;
Lee, Mungyu ;
Choi, Junho .
COGNITIVE SYSTEMS RESEARCH, 2019, 56 :142-150
[5]   Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection [J].
Egitmen, Alper ;
Bulut, Irfan ;
Aygun, R. Can ;
Gunduz, A. Bilge ;
Seyrekbasan, Omer ;
Yavuz, A. Gokhan .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[6]  
Emre D., P 2018 INT C BIG DAT, P3, DOI [10.1109/IBIGDELFT.2018.8625315, DOI 10.1109/IBIGDELFT.2018.8625315]
[7]   Android Malware Detection Using Fine-Grained Features [J].
Jiang, Xu ;
Mao, Baolei ;
Guan, Jun ;
Huang, Xingli .
SCIENTIFIC PROGRAMMING, 2020, 2020
[8]   MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports [J].
Karbab, ElMouatez Billah ;
Debbabi, Mourad .
DIGITAL INVESTIGATION, 2019, 28 :S77-S87
[9]  
Ke GL, 2017, ADV NEUR IN, V30
[10]  
Kshirsagar P., 2016, P ICCASPICMMD 2016AD, V385, P394, DOI [10.2991/iccasp-16.2017.59, DOI 10.2991/ICCASP-16.2017.59]