Skip to main content

2022 | OriginalPaper | Buchkapitel

Malware Discernment Using Machine Learning

verfasst von : Vivek Srivastava, Rohit Sharma

Erschienen in: Transforming Management with AI, Big-Data, and IoT

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malware has emerged as a major threat to computer systems the way the use of complex computer software is increasing nowadays, along with the security of that system which is also becoming a big concern. Malware is rapidly penetrating the security circle of computing devices. The trick to detect such malware is possible through machine learning, and it is also necessary to prepare computer resources that they can identify and combat the malware. Types of malware are increasing, and related threats are also increasing. This chapter covers good knowledge of machine learning to prevent malware attacks on computing devices and understand the important mechanisms of machine learning concerning malware attacks’ current trends.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Santos, I., Nieves, J., & Bringas, P. G. (2011). Semi-supervised learning for unknown malware detection. In International Symposium on Distributed Computing and Artificial Intelligence (pp. 415–422). Springer, Berlin, Heidelberg. Santos, I., Nieves, J., & Bringas, P. G. (2011). Semi-supervised learning for unknown malware detection. In International Symposium on Distributed Computing and Artificial Intelligence (pp. 415–422). Springer, Berlin, Heidelberg.
2.
Zurück zum Zitat Anderson, H., & Roth, P. (2018). EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv, abs/1804.04637. Anderson, H., & Roth, P. (2018). EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv, abs/1804.04637.
4.
Zurück zum Zitat Narudin, F. A., Feizollah, A., & Anuar, N. B. (2016). A gani – Soft computing. Springer. Narudin, F. A., Feizollah, A., & Anuar, N. B. (2016). A gani – Soft computing. Springer.
5.
Zurück zum Zitat Santos, I., Devesa, J., Brezo, F., Nieves, J., & Bringas, P. G. (2013). Opem: A static-dynamic approach for machine-learning-based malware detection. In International joint conference CISIS’12-ICEUTE´ 12-SOCO´ 12 special sessions (pp. 271–280). Springer, Berlin, Heidelberg. Santos, I., Devesa, J., Brezo, F., Nieves, J., & Bringas, P. G. (2013). Opem: A static-dynamic approach for machine-learning-based malware detection. In International joint conference CISIS’12-ICEUTE´ 12-SOCO´ 12 special sessions (pp. 271–280). Springer, Berlin, Heidelberg.
7.
Zurück zum Zitat Yang, C., Xu, J., Liang, S. et al. DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur 4, 16 (2021). Yang, C., Xu, J., Liang, S. et al. DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur 4, 16 (2021).
8.
Zurück zum Zitat Talukder, Sajedul. (2020). Tools and Techniques for Malware Detection and Analysis. Talukder, Sajedul. (2020). Tools and Techniques for Malware Detection and Analysis.
9.
Zurück zum Zitat Babaagba, K. O., & Adesanya, S. O. (2019). A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning. In ICEIT 2019: Proceedings of the 2019 8th International Conference on Educational and Information Technology (51–55). https://doi.org/10.1145/3318396.3318448 Babaagba, K. O., & Adesanya, S. O. (2019). A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning. In ICEIT 2019: Proceedings of the 2019 8th International Conference on Educational and Information Technology (51–55). https://​doi.​org/​10.​1145/​3318396.​3318448
10.
Zurück zum Zitat Shalaginov, A., Banin, S., Dehghantanha, A., & Franke, K. (2018). Machine learning aided static malware analysis: A survey and tutorial. In Cyber threat intelligence (pp. 7–45). Springer, Cham. Shalaginov, A., Banin, S., Dehghantanha, A., & Franke, K. (2018). Machine learning aided static malware analysis: A survey and tutorial. In Cyber threat intelligence (pp. 7–45). Springer, Cham.
12.
Zurück zum Zitat Hausken, K., & Welburn, J. W. (2020). Information systems Frontiers. Springer. Hausken, K., & Welburn, J. W. (2020). Information systems Frontiers. Springer.
13.
Zurück zum Zitat Kumar, M., Punia, S., Thompson, S., Gopal, D., & Patan, R. (2020). Performance analysis of machine learning algorithms for big data classification. International Journal of E-Health and Medical Communications (IJEHMC), 12(4), 60–75. Kumar, M., Punia, S., Thompson, S., Gopal, D., & Patan, R. (2020). Performance analysis of machine learning algorithms for big data classification. International Journal of E-Health and Medical Communications (IJEHMC), 12(4), 60–75.
14.
Zurück zum Zitat Sharma, A., & Sahay, S. K. (2014). Evolution and detection of polymorphic and metamorphic malware: A survey. International Journal of Computer Applications, 90(2), 7–11.CrossRef Sharma, A., & Sahay, S. K. (2014). Evolution and detection of polymorphic and metamorphic malware: A survey. International Journal of Computer Applications, 90(2), 7–11.CrossRef
15.
Zurück zum Zitat Govindaraju, A. (2010). Exhaustive statistical analysis for detection of metamorphic malware. Master’s project report, Department of Computer Science, San Jose State University.CrossRef Govindaraju, A. (2010). Exhaustive statistical analysis for detection of metamorphic malware. Master’s project report, Department of Computer Science, San Jose State University.CrossRef
16.
Zurück zum Zitat Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., & Giacinto, G. (2016). Novel feature extraction, selection and fusion for effective malware family classification. In ACM conference data application security privacy (pp. 183–194). ACM.CrossRef Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., & Giacinto, G. (2016). Novel feature extraction, selection and fusion for effective malware family classification. In ACM conference data application security privacy (pp. 183–194). ACM.CrossRef
17.
Zurück zum Zitat Sharma, A., & Sahay, S. K. (2016). An effective approach for classification of advanced malware with high accuracy. International Journal of Security and Its Applications, 10(4), 249–266.CrossRef Sharma, A., & Sahay, S. K. (2016). An effective approach for classification of advanced malware with high accuracy. International Journal of Security and Its Applications, 10(4), 249–266.CrossRef
20.
Zurück zum Zitat Stephan, T., Al-Turjman, F., Suresh Joseph, K., & Balusamy, B. (2020). Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks. International Journal of Machine Learning and Cybernetics. https://doi.org/10.1007/s13042-020-01154-y Stephan, T., Al-Turjman, F., Suresh Joseph, K., & Balusamy, B. (2020). Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks. International Journal of Machine Learning and Cybernetics. https://​doi.​org/​10.​1007/​s13042-020-01154-y
23.
Zurück zum Zitat Kumar, M., & Srivastava, S. (2018). Image authentication by assessing manipulations using illumination. Multimedia Tools and Applications, 78(9), 12451–11246.CrossRef Kumar, M., & Srivastava, S. (2018). Image authentication by assessing manipulations using illumination. Multimedia Tools and Applications, 78(9), 12451–11246.CrossRef
25.
Zurück zum Zitat O’Kane, P., Sezer, S., McLaughlin, K., & Im, E. G. (2013). SVM training phase reduction using dataset feature filtering for malware detection. IEEE transactions on information forensics and security, 8(3), 500–509. O’Kane, P., Sezer, S., McLaughlin, K., & Im, E. G. (2013). SVM training phase reduction using dataset feature filtering for malware detection. IEEE transactions on information forensics and security, 8(3), 500–509.
26.
Zurück zum Zitat Shang, F., Li, Y., Deng, X., & He, D. (2018). Android malware detection method based on naive Bayes and permission correlation algorithm. Cluster Computing, 21(1), 955–966. Shang, F., Li, Y., Deng, X., & He, D. (2018). Android malware detection method based on naive Bayes and permission correlation algorithm. Cluster Computing, 21(1), 955–966.
Metadaten
Titel
Malware Discernment Using Machine Learning
verfasst von
Vivek Srivastava
Rohit Sharma
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-86749-2_12

Premium Partner