Open Access Open Access  Restricted Access Subscription Access

Malware Analysis Using Supervised Machine Learning

Dr A R JayaSudha, Mohammed Anes J

Abstract


A research endeavor in the field of cyber security is being carried out under the working title of "Malware Analysis Using Supervised Machine Learning." For the purpose of identifying malicious software in the system, this initiative makes use of supervised machine learning. This endeavor relied heavily on using primary sources for its material. There is also something called dynamic malware analysis, which is when the software is analyzed in the malware analysis facility after it has been run. The environment is implemented on a Flare VM running the Windows 10 distribution. In order to acquire the log files, spyware and good ware must first be executed on the Flare virtual machine. The bag of words natural language processing methodology is used to retrieve data from these log files, and the collected data is then labelled. After this comes the process of teaching and evaluating the models. Four distinct algorithms, namely Random Forest, Decision Tree, Logistic Regression, and Support Vector Machines, were utilized in the process of training the model.


Full Text:

PDF

References


Malware-Data Set available: https://gs.statcounter.com/os-market-share, Accessed 19 June, 2021.

What is malware?: [Online].Available: https://searchsecurity.techtarget.com/definition/malware, Accessed 19 June, 2021

Ahmad, M. B., Fahad, M., Khan, A. W., & Asif, M. (2016), A First Step towards Reducing Insider Threats in Government Organizations, International Journal of Computer Science and Network Security, 16(6), 81-85.

Ahmad, M. B., Fahad, M., Khan, A. W., & Asif, M. (2016), Towards Securing Med- ical Documents from Insider Attacks, International Journal of Advanced Computer Science and Applications, 7(8), 357-360.

Ahmad, M. B., Akram, A., Asif, M., & Rehman, S. U. (2014), Using Genetic

Algo- rithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment, 2014, 1-1

What are the different types of Malware? [Online].Available: https://comtact.co.uk/blog/what-are-the-different-types-of-malware/, Accessed 19 June, 2021

What is a cyber-attack? [Online]. Available:

https://www.ibm.com/services/business- continuity/cyber-attack, Accessed 19 June, 2021

Anderson, H. S. & Roth, P. (2018). Ember: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637


Refbacks

  • There are currently no refbacks.