Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool

Authors

  • J. Dhiviya Rose School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun. INDIA 248007
  • Isha Mittal School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun. INDIA 248007
  • Ramya Mihir School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun. INDIA 248007

Keywords:

Malware, Internet Security, Machine Learning

Abstract

When COVID-19 hit the world, it altered the working pattern of all the people around the world. Along with this, it is seen that there has been an exponential growth in the cases of malware, trojans and cyber-crime rates. New and recent malwares uses advanced techniques like polymorphism and metamorphism to help in assisting the malware detection and analysis procedure. Identifying malware in view of its features and conduct is analytic and serious for the computer security. Most of the anti-viruses that are present rely upon the signature-based noticing which is moderately easy to dodge and evade and is insufficient and also ineffective for zero-day exploit-based malware. With the ascent of the Internet, there has been enormous development in the quantity of malware on the planet. With this project, we provide a new approach to identify malware using static analysis, i.e. without executing. With the help of different machine learning models, we will identify malware if present in any file, to prevent any further attacks. The target audience and the people who will majorly get benefitted from this project are the students as well as the working professionals who are these days working in online mode due to the pandemic. This application will promote an easy use to identify the files that they receive over emails, SMS, or any other e-mode, to scan before opening any malware file and getting trapped. The target audience for this proposed system is mainly all the students, and professionals, who are more likely to be active on the internet.

 

References

O. Aslan and R. Samet, “A Comprehensive Review on Malware Detection Approaches,” IEEE Access, vol. 8, pp. 6249–6271, 2020, doi: 10.1109/ACCESS.2019.2963724.

Y. Suleiman, S. Sezer, G. McWilliams, and I. Muttik, “New Android malware detection approach using Bayesian classification,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, pp. 121–128, 2013, doi: 10.1109/AINA.2013.88.

A. Kumar et al., “Malware detection using machine learning,” Commun. Comput. Inf. Sci., vol. 1232, pp. 61–71, 2020, doi: 10.1007/978-3-030-65384-2_5.

T. Alsmadi and N. Alqudah, “A Survey on malware detection techniques,” 2021 Int. Conf. Inf. Technol. ICIT 2021 - Proc., no. 2, pp. 371–376, 2021, doi: 10.1109/ICIT52682.2021.9491765.

A. Amamra, C. Talhi, and J. M. Robert, “Smartphone malware detection: From a survey towards taxonomy,” Proc. 2012 7th Int. Conf. Malicious Unwanted Software, Malware 2012, pp. 79–86, 2012, doi: 10.1109/MALWARE.2012.6461012.

S. Tenneriello, “Panoramas,” Herman Melv. Context, pp. 157–166, 2018, doi: 10.1017/9781316755204.017.

T. Alsmadi and N. Alqudah, “A Survey on malware detection techniques,” 2021 Int. Conf. Inf. Technol. ICIT 2021 - Proc., pp. 371–376, 2021, doi: 10.1109/ICIT52682.2021.9491765.

H. El Merabet and A. Hajraoui, “A survey of malware detection techniques based on machine learning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 1, pp. 366–373, 2019, doi: 10.14569/IJACSA.2019.0100148.

Z. Wang, Q. Liu, and Y. Chi, “Review of android malware detection based on deep learning,” IEEE Access, vol. 8, pp. 181102–181126, 2020, doi: 10.1109/ACCESS.2020.3028370.

H. S. Anderson, B. Filar, and P. Roth, “Evading Machine Learning Malware Detection,” BlackHat DC, p. 6, 2017, [Online]. Available: https://github.com/EndgameInc/gym-malware%0Ahttps://www.blackhat.com/docs/us-17/thursday/us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp.pdf.

D. J. Wu, C. H. Mao, T. E. Wei, H. M. Lee, and K. P. Wu, “DroidMat: Android malware detection through manifest and API calls tracing,” Proc. 2012 7th Asia Jt. Conf. Inf. Secur. AsiaJCIS 2012, pp. 62–69, 2012, doi: 10.1109/AsiaJCIS.2012.18.

H. W. Hsiao, D. N. Chen, and T. Wu, “Detecting hiding malicious website using network traffic mining approach,” ICETC 2010 - 2010 2nd Int. Conf. Educ. Technol. Comput., vol. 5, 2010, doi: 10.1109/ICETC.2010.5530064.

Omer Aslan, Abdullah Asim Yilmaz, "A New Malware Classification Framework Based on Deep Learning Algorithms," IEEE Access, vol. 9, pp. 87936-87951, 2021, doi: 10.1109/ACCESS.2021.3089586.

Sudhir Kumar Pandey, B.M. Mehtre, "Performance of malware detection tools: A comparison," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014, pp. 1811-1817, doi: 10.1109/ICACCCT.2014.7019422.

Y. Pan, X. Ge, C. Fang and Y. Fan, "A Systematic Literature Review of Android Malware Detection Using Static Analysis," in IEEE Access, vol. 8, pp. 116363-116379, 2020, doi: 10.1109/ACCESS.2020.3002842.

Sweta Khatana, Anurag Jain, "Malware Detection Using the Behavioral Analysis of the Web based Applications and User," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1026-1031, 2019.

Jamuna Rani S., Vagdevi S., "Online Intrusion and Security Measures in Social Networking Environment – A Survey", International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.39-45, 2020.

Downloads

Published

2022-04-30

How to Cite

[1]
J. D. Rose, I. Mittal, and R. Mihir, “Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 10, no. 2, pp. 64–68, Apr. 2022.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.