Malware Detection in Files and URL’s using Machine Learning

Authors

  • Prof. Balaji Chaugule  Department of Information Technology, Zeal College of Engineering and Research Narhe, Pune, Maharashtra, India
  • Omkar Chavan  Department of Information Technology, Zeal College of Engineering and Research Narhe, Pune, Maharashtra, India
  • Tushar Kokane  Department of Information Technology, Zeal College of Engineering and Research Narhe, Pune, Maharashtra, India
  • Sagar Hyalij  Department of Information Technology, Zeal College of Engineering and Research Narhe, Pune, Maharashtra, India
  • Dnyaneshwar Bhosale  Department of Information Technology, Zeal College of Engineering and Research Narhe, Pune, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT228618

Keywords:

Malware Prediction, Machine Learning Algorithm, SVM, Malware Dataset

Abstract

The use of Support Vector Machine (SVM) to machine learning-based malware detection is the main goal of this study. Since malware threats are always changing, more advanced detection techniques are required. With the help of SVM, a potent classification algorithm, our project is able to precisely identify malware based on a range of attributes. By developing a strong and effective solution that efficiently identifies and reduces malware threats, the aim is to improve cybersecurity and support continuous efforts to protect computer systems and networks. Malware has been posing a serious threat to embedded systems in recent times, and traditional software solutions like antivirus and patching haven't been able to keep up with the sophisticated and constantly changing bad programmes. In this work, we present guardol, a hardware-enhanced architecture designed to identify online malware. Guardol is a hybrid technique that combines FPGA and CPU. Our method seeks to capture malware's malevolent behaviour, or high-level semantics. In order to do this, we first suggest the frequency-centric model for building features out of benign samples and known malware's system call patterns. We next create a machine learning strategy in FPGA to train a classifier with these features, utilising a multilayer perceptron. The trained classifier is applied at runtime to categorise the unknown data as benign or malicious, with In this day and age of advanced technology, the internet has been embraced by most people. And with it has come an increased risk of malevolent cyberattacks by cybercriminals. The attacks are completed.

References

  1. StatCounter. (2018). Mobile Operating System Market Share Worldwide. Accessed: Mar. 19, 2018. [Online]. Available:http://gs.statcounter.com/osmarket-share/mobile/worldwide
  2. G. Suarez-Tangil and G. Stringhini, 'Eight years of rider measurement in the Android malware ecosystem: Evolution and lessons learned,' CoRR, vol. abs/1801.08115, pp. 1–18, Jan. 2018. [Online].Available:http://arxiv.org/abs/1801.08115
  3. N. Sun, J. Zhang, P. Rimba, S. Gao, Y. Xiang, and L. Y. Zhang, 'Datadriven cybersecurity incident prediction: A survey,' IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1744–1772, 2nd Quart., 2018.
  4. L. Ma, X. Liu, Q. Pei, and Y. Xiang, 'Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing,' IEEE Trans. Services Comput., vol. 12, no. 5, pp. 786–799, Sep./Oct. 2019.
  5. J. Qiu, W. Luo, L. Pan, Y. Tai, J. Zhang, and Y. Xiang, 'machine learning predicting the impact of malicious android,' IEEE Access, vol. 7, pp. 66304–66316,2019.doi:10.1109/ACCESS.2019.2914311.
  6. L. Liu, O. de Vel, Q.-L. Han, J. Zhang, and Y. Xiang, 'Detecting and preventing cyber insider threats: A survey,' IEEE Commun. Surveys Tuts., vol. 20, no. 2, pp. 1397–1417, 2nd Quart., 2018.
  7. Y. Zhong, H. Yamaki, and H. Takakura, 'A malware classification method based on similarity of function structure,' Applications and the Internet (SAINT), IEEE/IPSJ 12th International Symposium, pp. 256- 261, July 2012.
  8. U. Pehlivan, N. Baltaci, C. Acartürk, and Baykal, 'The analysis of feature selection methods and classification algorithms in permission based Android malware detection,' Computational Intelligence in Cyber Security (CICS), 2014 IEEE Symposium, pp. 1-8, December 2014.
  9. Y. Feng, O. Bastani, R. Martins, I. Dillig, and S. Anand, 'Automated synthesis of semantic malware signatures using maximum satisfiability,' in Proc. 24th Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS), San Diego, CA, USA, Feb./Mar. 2017, pp. 1–15. [Online]. Available:https://www.ndss,symposium.org/ndss2017/ndss-2017-programme automated-synthesis-semantic-malware-signatures-using maximum satisfiability/.doi:10.14722/ndss.2017.23379
  10. F. Wei, Y. Li, S. Roy, X. Ou, and W. Zhou, 'analysis of Deep ground truth Android of current malware,' in Proc. Int. Conf. Detection Intrusions Malware, Vulnerability Assessment. Cham, Switzerland: Springer, 2017, pp. 252–276
  11. Gavrilut D., Cimpoesu M., Anton D., & Ciortuz L., 'Malware of Prediction Using Machine Learning', International Multiconference on Information Technology, 2009 and computer science.
  12. Rhode, M., Burnap, P., & Jones, K 'Early-stage malware prediction using recurrent neural networks', computers & security, 2018.
  13. Baset, M, 'Machine Learning For Malware Detection', 2016.
  14. Yeo, M., Koo, Y., Yoon, Y., Hwang, T., Ryu, J., Song, J., & Park, C., 'Flow-based malware detection using convolutional neural network', 2018 International Conference on Information Networking, 2018.
  15. 'Features',lightgbm,Documentation. [online]Available:https://lightgbm.readthedocs.io/en/latest /Features.html.
  16. E. Mariconti, L. Onwuzurike, P. Andriotis, E. De Cristofaro, G. Ross, and G. Stringhini, 'MaMaDroid: Detecting Android malware by building Markov chains of behavioral models,' in Proc. 24th Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS), San Diego, CA, USA, Feb./Mar. 2017, pp. 1– 15. [Online]. Available: https://www.ndss-symposium.org/ndss2017/ndss 2017-programme/mamadroid-detecting-android-malware-building,markov-chains-behavioral-models/.doi:10.14722/ndss.2017.23353.

Downloads

Published

2024-02-29

Issue

Section

Research Articles

How to Cite

[1]
Prof. Balaji Chaugule, Omkar Chavan, Tushar Kokane, Sagar Hyalij, Dnyaneshwar Bhosale, " Malware Detection in Files and URL’s using Machine Learning " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 10, Issue 1, pp.79-84, January-February-2024. Available at doi : https://doi.org/10.32628/CSEIT228618