Analysis of Cyber Security Threats Using Machine Learning Techniques

Authors

Keywords:

Malware Detection, Malware Family Detection, KNN, SVM, API Calls Argument

Abstract

Nowadays malware detection is a problem that researchers have tried to solve for so many years by using enormous type of methods. The behaviors of two given malware variants remain similar, although their signatures could also be distinct. The proposed project mainly concentrates on classifying the malware families by considering the malware API sequence or API commands. This type of classification is helpful for the analyst as it helps them to get a better insight into the functioning of the malware.

References

H. Sun, Y. Lin, and M. Wu, “Api monitoring system for defeating worms and exploits in ms-windows system,” in Proceedings of the 11th Australasian Conference on Information Security and Privacy, 2006, pp. 159-170.

M. Egele, T. S. Scholte, E. Kirda, and C. Kruegel, “A survey on automated dynamicmalware-analysis techniques and tools,” ACM Computing Surveys, Vol. 44, 2012, pp.6:1-6:42.

K. Tsyganok, E. Tumoyan, M. Anikeev, and L. Babenko, “Classification of polymorphic and metamorphic malware samples based on their behavior,” in Networks,2012, pp. 111- 116.

C. Wang, J. Pang, R. Zhao, W. Fu, and X. Liu, “Malware detection based on suspiciousbehavior identification, ” in Proceedings of the 1st International Workshop on Education Technology and Computer Science, 2009, pp. 198-202.

S. Liu, H. Huang, and Y. Chen, “A system call analysis method with mapreduce for malware detection,” in Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011, pp. 631-637.

Ding Yuxin, Xia Xiaoling, Chen Sheng, Li Ye, A malware detection method based on family behavior graph, Computers & Security (2017).

YousraAafer, Wenliang Du, and Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , Dept. of Electrical Engineering & Computer Science Syracuse University, New York, USA fyaafer, wedu, heying@syr.edu.

Souri and Hosseini ,A state of the art survey of malware detection approaches using data mining techniques Hum. Cent.Comput. Inf. Sci. (2018) 8:3https://doi.org/10.1186/s13673-018-0125-x.

Deepak Koundel, SurajIthape, Vishakha Khobaragade, Rajat Jain B.E. Computer Science JSPM’s JSCOE Pune, India, Malware Classification using Naïve Bayes Classifier for Android OSThe International Journal Of Engineering And Science (IJES) Volume 3 Issue 4 Pages 59-63 2014 ISSN (e):

– 1813 ISSN (p): 2319 – 1805.

Dragos¸ Gavrilut¸ Mihai Cimpoes¸u1, Dan Anton1, Liviu Ciortuz, Faculty of Computer Science, University of Iasi, Romania, BitDefender Research Lab, Iasi, Romania, Malware detection using machine learning Conference Paper • November 2009, DOI: 10.1109/IMCSIT.2009.5352759 • Source: IEEE Xplore.

Chih-ta lin, nai-jian wang, han xiao and Claudia eckert, Department of Electrical Engineering, National Taiwan University of Science and Technology Taipei, 106 Taiwan, Feature Selection and Extraction for Malware Classification, Journal of Information Science And Engineering 31, 965-992 (2015)

Downloads

Published

2024-02-01

How to Cite

[1]
Ranjana B Nadagoudar, “Analysis of Cyber Security Threats Using Machine Learning Techniques”, IJIRCST, vol. 12, no. 1, pp. 35–39, Feb. 2024.

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.