Malware Analysis Using Supervised Machine Learning
Abstract
A research endeavor in the field of cyber security is being carried out under the working title of "Malware Analysis Using Supervised Machine Learning." For the purpose of identifying malicious software in the system, this initiative makes use of supervised machine learning. This endeavor relied heavily on using primary sources for its material. There is also something called dynamic malware analysis, which is when the software is analyzed in the malware analysis facility after it has been run. The environment is implemented on a Flare VM running the Windows 10 distribution. In order to acquire the log files, spyware and good ware must first be executed on the Flare virtual machine. The bag of words natural language processing methodology is used to retrieve data from these log files, and the collected data is then labelled. After this comes the process of teaching and evaluating the models. Four distinct algorithms, namely Random Forest, Decision Tree, Logistic Regression, and Support Vector Machines, were utilized in the process of training the model.
Full Text:
PDFReferences
Malware-Data Set available: https://gs.statcounter.com/os-market-share, Accessed 19 June, 2021.
What is malware?: [Online].Available: https://searchsecurity.techtarget.com/definition/malware, Accessed 19 June, 2021
Ahmad, M. B., Fahad, M., Khan, A. W., & Asif, M. (2016), A First Step towards Reducing Insider Threats in Government Organizations, International Journal of Computer Science and Network Security, 16(6), 81-85.
Ahmad, M. B., Fahad, M., Khan, A. W., & Asif, M. (2016), Towards Securing Med- ical Documents from Insider Attacks, International Journal of Advanced Computer Science and Applications, 7(8), 357-360.
Ahmad, M. B., Akram, A., Asif, M., & Rehman, S. U. (2014), Using Genetic
Algo- rithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment, 2014, 1-1
What are the different types of Malware? [Online].Available: https://comtact.co.uk/blog/what-are-the-different-types-of-malware/, Accessed 19 June, 2021
What is a cyber-attack? [Online]. Available:
https://www.ibm.com/services/business- continuity/cyber-attack, Accessed 19 June, 2021
Anderson, H. S. & Roth, P. (2018). Ember: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637
Refbacks
- There are currently no refbacks.