To Identify Malware Using Machine Learning Algorithms

被引:1
作者
Pujari, Shivam [1 ]
Mandoria, H. L. [1 ]
Shrivastava, R. P. [1 ]
Singh, Rajesh [1 ]
机构
[1] Govind Ballabh Pant Univ Agr & Technol, Pantnagar 263145, Uttarakhand, India
来源
COMPUTING SCIENCE, COMMUNICATION AND SECURITY | 2022年 / 1604卷
关键词
Malware; Feature extraction; Feature selection; Machine learning; Weka explorer;
D O I
10.1007/978-3-031-10551-7_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's world depends on cyberspace since it is very useful for collecting information, data and transporting them in a secured manner. This security may be broken by various attackers by injecting malware to another device through various ways such as malicious links generally. Malware is like software that may harm the system of the user. The most commonly used malware nowadays is ransomware coverts files or any data to unused form by encryption and demands money for regaining original data. So we need a method to detect it to stop it to work in any condition like updating its signature etc. We propose a method to identify different types of malwares including ransomware with the use of API call data. We achieve the highest accuracy of 0.9636.
引用
收藏
页码:117 / 127
页数:11
相关论文
共 24 条
[1]  
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[2]   Ransomware attacks: detection, prevention and cure [J].
Brewer R. .
Network Security, 2016, 2016 (09) :5-9
[3]   Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics [J].
Cabaj, Krzysztof ;
Gregorczyk, Marcin ;
Mazurczyk, Wojciech .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 :353-368
[4]   The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes [J].
Carlini, Domhnall ;
Cowan, Alexandra ;
O'Kane, Philip ;
Sezer, Sakir .
IEEE ACCESS, 2017, 5 :17742-17752
[5]   Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection [J].
Chen, Jing ;
Wang, Chiheng ;
Zhao, Ziming ;
Chen, Kai ;
Du, Ruiying ;
Ahn, Gail-Joon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) :1286-1300
[6]   Machine Learning-Based Detection of Ransomware Using SDN [J].
Cusack, Greg ;
Michel, Oliver ;
Keller, Eric .
PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18), 2018, :1-6
[7]  
Haddadi Fariba, 2010, Proceedings of the 2010 Second International Conference on Computer and Network Technology (ICCNT 2010), P262, DOI 10.1109/ICCNT.2010.28
[8]  
Kharraz A, 2015, LECT NOTES COMPUT SC, V9148, P3, DOI 10.1007/978-3-319-20550-2-1
[9]  
Lupu Emil C., 2016, IEEE ACCESS
[10]  
Manoun A., 2011, INT CYBER RESILIENCE, P13