

Using KNN Model and Signature-Based Model as Hybrid Model for Malware Detection
Abstract
In this modern generation, identification of malicious software has become a crucial undertaking. This research presents a way of detecting malware by using signature-based detection and K-Nearest Neighbor algorithm. The study evaluates the research outperforms the existing techniques. Significant improvement in accuracy of 96.96% over baseline method. Combination of Signature+KNN demonstrates equal accuracy and speeds up the detection. This research underscores the potential of a proposed approach to enhance cybersecurity effectiveness.
References
McAfee. (n.d.). What is malware and why do cybercriminals use malware? [online] Available at: https://www.mcafee.com/en-my/antivirus/malware.html.
EDUCBA. (2020). Types of Computer Worms | List of 5 Types of Computer Worms. [online] Available at: https://www.educba.com/types-of-computer-worms/.
Trend Micro (2011). Ransomware - Definition - Trend Micro USA. [online] Trendmicro.com. Available at: https://www.trendmicro.com/vinfo/us/security/definition/ransomware.
The Editors of Encyclopedia Britannica (2018). Trojan horse | Story & Facts. In: Encyclopædia Britannica. [online] Available at: https://www.britannica.com/topic/Trojan-horse.
M. Asam et al., “IoT Malware Detection Architecture Using a Novel Channel Boosted and Squeezed CNN,” Sci Rep, vol. 12, no. 1, pp. 1–12, Dec. 2022, doi: 10.1038/s41598-022-18936-9.
Techslang (2022). What is Signature-Based Detection? — Techslang. [online] Techslang — Tech Explained in Simple Terms. Available at: https://www.techslang.com/definition/what-is-signature-based-detection/
VMRay (2023). Malware Sandbox. [online] VMRay. Available at: https://www.vmray.com/glossary/malware-sandbox/.
IBM (n.d.). What is the k-nearest neighbors algorithm? | IBM. [online] www.ibm.com. Available at: https://www.ibm.com/topics/knn#:~:text=Next%20steps-
S. A. Roseline, S. Geetha, S. Kadry, and Y. Nam, “Intelligent VisionBased Malware Detection and Classification Using Deep Random Forest Paradigm,” IEEE Access, vol. 8, pp. 206303–206324, 2020, doi: 10.1109/ACCESS.2020.3036491.
M. S. Akhtar and T. Feng, “Malware Analysis and Detection Using Machine Learning Algorithms,” Symmetry (Basel), vol. 14, no. 11, Nov. 2022, doi: 10.3390/sym14112304.
Refbacks
- There are currently no refbacks.