Evaluating Malware Detection System using Machine Learning Algorithms

Authors

  • S. Bhaskara Naik  Lecturer, S.V.B.Government Degree College, Koilakuntla, Kurnool(Dist), Andhra Pradesh, India
  • B. Mahesh  Associate Professor, Department of CSE, Dr. K.V.Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India

DOI:

https://doi.org//10.32628/CSEIT217518

Keywords:

Malware, Machine Learning, Deep Learning, classification algorithms, Random Forest

Abstract

Malware, is any program or document that is unsafe to a PC client. Kinds of malware can incorporate PC infections, worms, Trojan ponies and spyware. These noxious projects can play out an assortment of capacities like taking, scrambling or erasing touchy information, adjusting or commandeering center processing capacities and observing clients' PC action. Malware identification is the way toward checking the PC and documents to distinguish malware. It is viable at distinguishing malware on the grounds that it includes numerous instruments and approaches. It's anything but a single direction measure, it's very intricate. The beneficial thing is malware identification and evacuation take under 50 seconds as it were. The outstanding development of malware is representing an extraordinary risk to the security of classified data. The issue with a significant number of the current order calculations is their small presentation in term of their capacity to identify and forestall malware from tainting the PC framework. There is a critical need to assess the exhibition of the current Machine Learning characterization calculations utilized for malware identification. This will help in making more hearty and productive calculations that have the ability to conquer the shortcomings of the current calculations. As of late, AI methods have been the main focus of the security specialists to distinguish malware and foresee their families powerfully. Yet, to the best of our information, there exists no complete work that looks at and assesses a sufficient number of machine learning strategies for characterizing malware and favorable examples. In this work, we led a set of examinations to assess AI strategies for distinguishing malware and their classification into respective families powerfully. This investigation did the presentation assessment of some characterization calculations like J45, LMT, Naive Bayes, Random Forest, MLP Classifier, Random Tree, AdaBoost, KStar. The presentation of the calculations was assessed as far as Accuracy, Precision, Recall, Kappa Statistics, F-Measure, Matthew Correlation Coefficient, Receiver Operator Characteristics Area and Root Mean Squared Error utilizing WEKA AI and information mining recreation device. Our test results showed that Random Forest calculation delivered the best exactness of 99.2%. This decidedly shows that the Random Forest calculation accomplishes great precision rates in identifying malware.

References

  1. SF Ahmad, SZ Ahmad, SR Xu, and B Li. Next gen-eration malware analysis techniques and tools. InElectronics, Information Technology and Intellectu-alization: Proceedings of the International Confer-ence EITI 2014, Shenzhen, China, 16-17 August 2014,page 17. CRC Press, 2015.
  2. Ulrich Bayer, Andreas Moser, Christopher Kruegel,and Engin Kirda. Dynamic analysis of malicious code.Journal in Computer Virology, 2(1):67–77, 2006.
  3. R. Bellman. Adaptive control processes: a guidedtour princeton university press. Princeton, New Jer-sey, USA, 1961.
  4. Silvio Cesare and Yang Xiang. Software similarityand classification. Springer Science & Business Me-dia, 2012.
  5. Gianluca Dini, Fabio Martinelli, Andrea Saracino, andDaniele Sgandurra. Madam: a multi-level anomalydetector for android malware. In International Con-ference on Mathematical Methods, Models, and Ar-chitectures for Computer Network Security, pages240–253. Springer, 2012.
  6. Manuel Egele, Theodoor Scholte, Engin Kirda, andChristopher Kruegel. A survey on automated dynamicmalware-analysis techniques and tools. ACM Comput-ing Surveys (CSUR), 44(2):6, 2012.
  7. Christian Gorecki, Felix C Freiling, Marc K ¨uhrer, andThorsten Holz. Trumanbox: Improving dynamic mal-ware analysis by emulating the internet. In Stabi-lization, Safety, and Security of Distributed Systems,pages 208–222. Springer, 2011.
  8. Kent Griffin, Scott Schneider, Xin Hu, and Tzi-CkerChiueh. Automatic generation of string signatures formalware detection. In Recent advances in intrusiondetection, pages 101–120. Springer, 2009.
  9. Chun-Ying Huang, Yi-Ting Tsai, and Chung-HanHsu. Performance evaluation on permission-based de-tection for android malware. In Advances in Intelli-gent Systems and Applications-Volume 2, pages 111–120. Springer, 2013.
  10. Youngjoon Ki, Eunjin Kim, and Huy Kang Kim. Anovel approach to detect malware based on api call se-quence analysis. International Journal of DistributedSensor Networks, 2015:4, 2015.
  11. Sotiris B Kotsiantis, Ioannis D Zaharakis, and Panayi-otis E Pintelas. Machine learning: a review of classi-fication and combining techniques. Artificial Intelli-gence Review, 26(3):159–190, 2006.
  12. G. Kumar and K. Kumar. Ai based supervised clas-sifiers: an analysis for intrusion detection. In Proc.of International Conference on Advances in Comput-ing and Artificial Intelligence, pages 170–174. ACM,2011.
  13. G. Kumar and K. Kumar. An information theoreticapproach for feature selection. Security and Commu-nication Networks, 5(2):178–185, 2012.
  14. G. Kumar, K. Kumar, and M. Sachdeva. The use ofartificial intelligence based techniques for intrusiondetection: a review. Artificial Intelligence Review,34(4):369–387, 2010.
  15. Andreas Moser, Christopher Kruegel, and EnginKirda. Limits of static analysis for malware detec-tion. In Computer security applications conference,2007. ACSAC 2007. Twenty-third annual, pages 421–430. IEEE, 2007.
  16. S. Mukkamala and A.H. Sung. A comparative studyof techniques for intrusion detection. In Proc. of 15thIEEE International Conference on Tools with Artifi-cial Intelligence, 2003, pages 570–577. IEEE, 2003.
  17. Fairuz Amalina Narudin, Ali Feizollah, Nor BadrulAnuar, and Abdullah Gani. Evaluation of machinelearning classifiers for mobile malware detection. SoftComputing, 20(1):343–357, 2016.
  18. Philip O’Kane, Sakir Sezer, and Keiran McLaughlin.Obfuscation: The hidden malware. Security & Pri-vacy, IEEE, 9(5):41–47, 2011.
  19. Konrad Rieck, Thorsten Holz, Carsten Willems,Patrick D¨ussel, and Pavel Laskov. Learning and clas-sification of malware behavior. In Detection of In-trusions and Malware, and Vulnerability Assessment,pages 108–125. Springer, 2008.
  20. Cuckoo Sandbox. Automated malware analysis, 2013.
  21. Bhaskar Pratim Sarma, Ninghui Li, Chris Gates,Rahul Potharaju, Cristina Nita-Rotaru, and Ian Mol-loy. Android permissions: a perspective combiningrisks and benefits. In Proceedings of the 17th ACMsymposium on Access Control Models and Technolo-gies, pages 13–22. ACM, 2012

Downloads

Published

2021-10-30

Issue

Section

Research Articles

How to Cite

[1]
S. Bhaskara Naik, B. Mahesh, " Evaluating Malware Detection System using Machine Learning Algorithms, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 5, pp.43-48, September-October-2021. Available at doi : https://doi.org/10.32628/CSEIT217518