Open Access Open Access  Restricted Access Subscription or Fee Access

Assessing the Effectiveness of Machine Learning Algorithms in Simulating Malware Detection Processes

Mannu Priya, Toofan Mukherjee, Purva Agarwal

Abstract


On the information system comprehends, computer virus attacks play a very important role and, by undermining regionally and globally, are considered one of the most critical threats. The traditional malware detection methods, more varied, being based on signature, are incapable of providing sufficient coverage over malicious programs in a short time. This is due to the speed of evolution and growing complexity of malware variants. This situation, in turn, requires the development of sophisticated and variant manipulating detection ways, which must be ready to attack any new development of malware. ML is an
attractive alternative and it is possible due to its ability to deduce patterns from complicated signals and because it can adjust to
the ever-growing amount of data. The paper is focused on the mathematically oriented approximation of malware detection
machine-learning system both quantitative and descriptive. The main target of this study is the performance evaluation and
behavioral assessment of the suggested system in the detection and classification of malicious processes of different types. To
accomplish this a heterogeneous dataset is used which contains both benign and malicious samples of software and they are
employed for the training and evaluation of the ML algorithms. Beyond merely understanding, these models are developed
through pattern and anomaly detection, thereby making detection precise. The performance nature of the ML element is accurately
assessed against the classic authentication (signature) –based approach and most up-to-date powerful detection tools of advanced
malware. A comparative study is inevitably needed to validate the ML approach under traditional solutions that run into problems
when a zero-day that is unfamiliar to detection or polymorphic malware is encountered.
In a nutshell, the results demonstrate that in comparison with the standard techniques, machine learning-based detection system
performs well in terms of accuracy, and detection rates. This advantage in essence illustrates that having such massive datasets is
the way forward in malware detection as it offers sleeker and more intelligent defense mechanisms. The investigations in the study
demonstrate the fundamental role of machine learning in the development of cybersecurity and proposes its inclusion in
cybersecurity strategies due to its high-level information processing abilities and flexibility making it possible to develop a smart
malware detection system capable of dealing with the sophisticated and changing threats in the internet.


Keywords


Terms—Malware, Trojan, Virus, Detection, Machine Learning

Full Text:

PDF

References


Sun, L., Wei, X., Zhang, J., He, L., Philip, S.Y. and Srisa-an, W., 2017, December. Contaminant removal for android malware detection systems. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 1053-1062). IEEE.

Ding, Y., Xia, X., Chen, S. and Li, Y., 2018. A malware detection method based on family behavior graph. Computers & Security, 73, pp.73-86.

Pektaş, A. and Acarman, T., 2017. Classification of malware families based on runtime behaviors. Journal of information security and applications, 37, pp.91-100.

Mirza, Q.K.A., Awan, I. and Younas, M., 2018. CloudIntell: An intelligent malware detection system. Future Generation Computer Systems, 86, pp.1042-1053.

Gu, J., Sun, B., Du, X., Wang, J., Zhuang, Y. and Wang, Z., 2018. Consortium blockchain- based malware detection in mobile devices. IEEE Access, 6, pp.12118-12128.

Kim, H., Kim, J., Kim, Y., Kim, I., Kim, K.J. and Kim, H., 2019. Improvement of malware detection and classification using API call sequence alignment and visualization. Cluster Computing,

(1), pp.921-929.

Chowdhury, M., Rahman, A. and Islam, R., 2017, June. Malware analysis and detection using data mining and machine learning classification. In International Conference on Applications and Techniques in Cyber Security and Intelligence (pp. 266-274). EdizionidellaNormale, Cham.

Yuxin, D. and Siyi, Z., 2019. Malware detection based on deep learning algorithm. Neural Computing and Applications, 31(2), pp.461-472.

Anderson, H.S., Kharkar, A., Filar, B. and Roth, P., 2017. Evading machine learning malware detection. black Hat.

Mohamed, G.A. and Ithnin, N.B., 2017, April. SBRT: API signature behaviour based representation technique for improving

metamorphic malware detection. In International Conference of Reliable Information and Communication Technology (pp. 767-777). Springer, Cham.

Kumar, R., Xiaosong, Z., Khan, R.U., Ahad, I. and Kumar, J., 2018, March. Malicious code detection based on image processing using deep learning. In Proceedings of the 2018 International Conference on Computing and Artificial Intelligence (pp. 81- 85).

Wang, S., Chen, Z., Yan, Q., Yang, B., Peng, L. and Jia, Z., 2019. A mobile malware detection method using behavior features in network traffic. Journal of Network and Computer Applications, 133, pp.15-25.

Kim, T., Kang, B., Rho, M., Sezer, S. and Im, E.G., 2018. A multimodal deep learning method for android malware detection using various features. IEEE Transactions on Information Forensics and

Security, 14(3), pp.773-788.

Zhang, L., Thing, V.L. and Cheng, Y., 2019. A scalable and extensible framework for android malware detection and family attribution. Computers & Security, 80, pp.120-133.

Li, W., Wang, Z., Cai, J. and Cheng, S., 2018, March. An Android malware detection approach using weight-adjusted deep learning. In 2018 International Conference on Computing, Networking and Communications (ICNC) (pp. 437-441). IEEE.

Ab Razak, M.F., Anuar, N.B., Othman, F., Firdaus, A., Afifi, F. and Salleh, R., 2018. Bio- inspired for features optimization and malware detection. Arabian Journal for Science and Engineering, 43(12), pp.6963-6979.

Ni, S., Qian, Q. and Zhang, R., 2018. Malware identification using visualization images and deep learning. Computers & Security, 77, pp.871-885.

Venkatraman, S., Alazab, M. and Vinayakumar, R., 2019. A hybrid deep learning image- based analysis for effective malware detection. Journal of Information Security and Applications, 47, pp.377-

Abusnaina, A., Khormali, A., Alasmary, H., Park, J., Anwar, A. and Mohaisen, A., 2019, July. Adversarial learning attacks on graph-based IoT

malware detection systems. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (pp. 1296- 1305). IEEE.

Yadav, R.M., 2019. Effective analysis of malware detection in cloud computing. Computers & Security, 83, pp.14-21.

Milosevic, J., Malek, M. and Ferrante, A., 2019. Time, accuracy and power consumption tradeoff in mobile malware detection systems. Computers & Security, 82, pp.314-328.

Hashemi, H. and Hamzeh, A., 2019. Visual malware detection using local malicious pattern. Journal of Computer Virology and Hacking

Techniques, 15(1), pp.1-14.

Karanja, E.M., Masupe, S. and Jeffrey, M.G., 2020. Analysis of internet of things malware using image texture features and machine learning techniques. Internet of Things, 9, p.100153.

Nahmias, D., Cohen, A., Nissim, N. and Elovici, Y., 2020. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks, 124,

pp.243-257.

Ren, Z., Wu, H., Ning, Q., Hussain, I. and Chen, B., 2020. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Networks, 101, p.102098.

Vasan, D., Alazab, M., Wassan, S., Safaei, B. and Zheng, Q., 2020. Image-Based malware classification using ensemble of CNN architectures

(IMCEC). Computers & Security, p.101748.

Mishra, P., Verma, I. and Gupta, S., 2020. KVM Inspector: KVM Based introspection approach to detect malware in cloud environment.

Journal of Information Security and Applications, 51, p.102460.

De Lorenzo, A., Martinelli, F., Medvet, E., Mercaldo, F. and Santone, A., 2020. Visualizing the outcome of dynamic analysis of Android

malware with VizMal. Journal of Information Security and Applications, 50, p.102423.

Yan, P. and Yan, Z., 2018. A survey on dynamic mobile malware detection. Software Quality Journal, 26(3), pp.891-919.

Sharafaldin, I., Lashkari, A.H. and Ghorbani, A.A., 2018, January. Toward generating a new intrusion detection dataset and intrusion traffic

characterization. In ICISSP (pp. 108-116).

K. K. Sureshkumar and N. M. Elango, “An Efficient Approach to Forecast Indian Stock Market Price and their Performance Analysis”,

International Journal of Computer Applications, vol. 34, pp. 44-49, 2011.

S. Kumar Chandar,” Predicting the Stock Price Index of Yahoo Data Using Elman Network”, International Journal of Control Theory and

Applications, vol. 10, no. 10, 2017.

Jigar Patel, Shah, Sahil and Priyank Thakkar, “Predicting stock and stock price index movement using Trend Deterministic Data Preparation and machine learning techniques”, Expert Systems with Applications, vol. 42, pp. 259-268, 2015

Sunil Kumar, Vivek Kumar and R. K. Sharma, “Artificial Neural Network based model for rice yield forecasting”, International journal of

Computational Intelligence Research, vol. 10, no. 1, pp. 73-90, 2014.

Kunwar Singh Vaisla and Ashutosh Kumar Bhatt. An analysis of the performance of artificial neural network technique for stock market forecasting International Journal of Computer Science and Engineering, vol. 2, no. 6, pp. 2104–2109, 2010. 105




DOI: https://doi.org/10.37591/joedt.v14i3.7844

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Journal of Electronic Design Technology