Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2023

01-12-2023

Features of Detecting Malicious Installation Files Using Machine Learning Algorithms

Authors: P. E. Yugai, E. V. Zhukovskii, P. O. Semenov

Published in: Automatic Control and Computer Sciences | Issue 8/2023

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type of Trojan installers and downloaders. A comparative analysis of machine learning algorithms applicable for the solution of this problem is provided: the naive Bayes classifier (NBC), random forest, and C4.5 algorithm. Machine learning models are developed using the Weka software. The most significant attributes of installation files of legitimate and Trojan programs are highlighted.
Literature
1.
go back to reference Fadilpashich, S., Fake Windows 11 upgrade installers are infected with malware, www.techradar.com, 2022. https://www.techradar.com/news/these-fake-windows-11-upgrade-installers-just-infect-you-with-malware. Fadilpashich, S., Fake Windows 11 upgrade installers are infected with malware, www.techradar.com, 2022. https://​www.​techradar.​com/​news/​these-fake-windows-11-upgrade-installers-just-infect-you-with-malware.​
2.
go back to reference Tulas, B., Malicious Notepad++ installers push StrongPity malware, 2021. https://www.bleepingcomputer.com/news/security/malicious-notepad-plus-plus-installers-push-strongpity-malware/. Tulas, B., Malicious Notepad++ installers push StrongPity malware, 2021. https://​www.​bleepingcomputer​.​com/​news/​security/​malicious-notepad-plus-plus-installers-push-strongpity-malware/​.​
4.
go back to reference Zegzhda, D.P., Aleksandrova, E.B., Kalinin, M.O., et al., Kiberbezopasnost’ tsifrovoi industrii. Teoriya i praktika funktsional’noi ustoichivosti k kiberatakam (Cybersecurity of Digital Industry: Theory and Practice of Functional Stability to Cyber Attacks), Zegzhda, D.P., Ed., Moscow: Goryachaya Liniya-Telekom, 2021. Zegzhda, D.P., Aleksandrova, E.B., Kalinin, M.O., et al., Kiberbezopasnost’ tsifrovoi industrii. Teoriya i praktika funktsional’noi ustoichivosti k kiberatakam (Cybersecurity of Digital Industry: Theory and Practice of Functional Stability to Cyber Attacks), Zegzhda, D.P., Ed., Moscow: Goryachaya Liniya-Telekom, 2021.
5.
8.
9.
go back to reference Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, Proc. 8th Int. Conf. on Security of Information and Networks, Sochi, 2015, New York: Association for Computing Machinery, 2015, pp. 127–130. https://doi.org/10.1145/2799979.2800023 Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, Proc. 8th Int. Conf. on Security of Information and Networks, Sochi, 2015, New York: Association for Computing Machinery, 2015, pp. 127–130. https://​doi.​org/​10.​1145/​2799979.​2800023
10.
go back to reference Lukach, Yu.S., Structure of executable files in Win32 and Win64. http://cs.usu.edu.ru/docs/pe/. Lukach, Yu.S., Structure of executable files in Win32 and Win64. http://​cs.​usu.​edu.​ru/​docs/​pe/​.​
12.
go back to reference Pal, M. and Mather, P.M., Decision tree based classification of remotely sensed data, 22nd Asian Conf. on Remote Sensing, Singapore, 2014, pp. 9–16. Pal, M. and Mather, P.M., Decision tree based classification of remotely sensed data, 22nd Asian Conf. on Remote Sensing, Singapore, 2014, pp. 9–16.
15.
go back to reference Khsina, B., Merbukha, A., Ezzikuri, Kh., and Erritali, M., Comparative study of decision tree ID3 and C4.5, Mezhdunarodnyi Zh. Peredovykh Komp’yuternykh Nauk Prilozhenii, 2014, pp. 3–7. Khsina, B., Merbukha, A., Ezzikuri, Kh., and Erritali, M., Comparative study of decision tree ID3 and C4.5, Mezhdunarodnyi Zh. Peredovykh Komp’yuternykh Nauk Prilozhenii, 2014, pp. 3–7.
Metadata
Title
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
Authors
P. E. Yugai
E. V. Zhukovskii
P. O. Semenov
Publication date
01-12-2023
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2023
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411623080333

Other articles of this Issue 8/2023

Automatic Control and Computer Sciences 8/2023 Go to the issue