Full Paper View Go Back
Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool
J. Dhiviya Rose1 , Isha Mittal2 , Ramya Mihir3
Section:Research Paper, Product Type: Journal-Paper
Vol.10 ,
Issue.2 , pp.64-68, Apr-2022
Online published on Apr 30, 2022
Copyright © J. Dhiviya Rose, Isha Mittal, Ramya Mihir . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: J. Dhiviya Rose, Isha Mittal, Ramya Mihir, “Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool,” International Journal of Scientific Research in Computer Science and Engineering, Vol.10, Issue.2, pp.64-68, 2022.
MLA Style Citation: J. Dhiviya Rose, Isha Mittal, Ramya Mihir "Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool." International Journal of Scientific Research in Computer Science and Engineering 10.2 (2022): 64-68.
APA Style Citation: J. Dhiviya Rose, Isha Mittal, Ramya Mihir, (2022). Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool. International Journal of Scientific Research in Computer Science and Engineering, 10(2), 64-68.
BibTex Style Citation:
@article{Rose_2022,
author = {J. Dhiviya Rose, Isha Mittal, Ramya Mihir},
title = {Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2022},
volume = {10},
Issue = {2},
month = {4},
year = {2022},
issn = {2347-2693},
pages = {64-68},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2753},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2753
TI - Efficient and Simple Machine Learning-based Malware and Trojan Identification Tool
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - J. Dhiviya Rose, Isha Mittal, Ramya Mihir
PY - 2022
DA - 2022/04/30
PB - IJCSE, Indore, INDIA
SP - 64-68
IS - 2
VL - 10
SN - 2347-2693
ER -
Abstract :
When COVID-19 hit the world, it altered the working pattern of all the people around the world. Along with this, it is seen that there has been an exponential growth in the cases of malware, trojans and cyber-crime rates. New and recent malwares uses advanced techniques like polymorphism and metamorphism to help in assisting the malware detection and analysis procedure. Identifying malware in view of its features and conduct is analytic and serious for the computer security. Most of the anti-viruses that are present rely upon the signature-based noticing which is moderately easy to dodge and evade and is insufficient and also ineffective for zero-day exploit-based malware. With the ascent of the Internet, there has been enormous development in the quantity of malware on the planet. With this project, we provide a new approach to identify malware using static analysis, i.e. without executing. With the help of different machine learning models, we will identify malware if present in any file, to prevent any further attacks. The target audience and the people who will majorly get benefitted from this project are the students as well as the working professionals who are these days working in online mode due to the pandemic. This application will promote an easy use to identify the files that they receive over emails, SMS, or any other e-mode, to scan before opening any malware file and getting trapped. The target audience for this proposed system is mainly all the students, and professionals, who are more likely to be active on the internet.
Key-Words / Index Term :
Malware, Internet Security, Machine Learning
References :
[1] O. Aslan and R. Samet, “A Comprehensive Review on Malware Detection Approaches,” IEEE Access, vol. 8, pp. 6249–6271, 2020, doi: 10.1109/ACCESS.2019.2963724.
[2] Y. Suleiman, S. Sezer, G. McWilliams, and I. Muttik, “New Android malware detection approach using Bayesian classification,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, pp. 121–128, 2013, doi: 10.1109/AINA.2013.88.
[3] A. Kumar et al., “Malware detection using machine learning,” Commun. Comput. Inf. Sci., vol. 1232, pp. 61–71, 2020, doi: 10.1007/978-3-030-65384-2_5.
[4] T. Alsmadi and N. Alqudah, “A Survey on malware detection techniques,” 2021 Int. Conf. Inf. Technol. ICIT 2021 - Proc., no. 2, pp. 371–376, 2021, doi: 10.1109/ICIT52682.2021.9491765.
[5] A. Amamra, C. Talhi, and J. M. Robert, “Smartphone malware detection: From a survey towards taxonomy,” Proc. 2012 7th Int. Conf. Malicious Unwanted Software, Malware 2012, pp. 79–86, 2012, doi: 10.1109/MALWARE.2012.6461012.
[6] S. Tenneriello, “Panoramas,” Herman Melv. Context, pp. 157–166, 2018, doi: 10.1017/9781316755204.017.
[7] T. Alsmadi and N. Alqudah, “A Survey on malware detection techniques,” 2021 Int. Conf. Inf. Technol. ICIT 2021 - Proc., pp. 371–376, 2021, doi: 10.1109/ICIT52682.2021.9491765.
[8] H. El Merabet and A. Hajraoui, “A survey of malware detection techniques based on machine learning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 1, pp. 366–373, 2019, doi: 10.14569/IJACSA.2019.0100148.
[9] Z. Wang, Q. Liu, and Y. Chi, “Review of android malware detection based on deep learning,” IEEE Access, vol. 8, pp. 181102–181126, 2020, doi: 10.1109/ACCESS.2020.3028370.
[10] H. S. Anderson, B. Filar, and P. Roth, “Evading Machine Learning Malware Detection,” BlackHat DC, p. 6, 2017, [Online]. Available: https://github.com/EndgameInc/gym-malware%0Ahttps://www.blackhat.com/docs/us-17/thursday/us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp.pdf.
[11] D. J. Wu, C. H. Mao, T. E. Wei, H. M. Lee, and K. P. Wu, “DroidMat: Android malware detection through manifest and API calls tracing,” Proc. 2012 7th Asia Jt. Conf. Inf. Secur. AsiaJCIS 2012, pp. 62–69, 2012, doi: 10.1109/AsiaJCIS.2012.18.
[12] H. W. Hsiao, D. N. Chen, and T. Wu, “Detecting hiding malicious website using network traffic mining approach,” ICETC 2010 - 2010 2nd Int. Conf. Educ. Technol. Comput., vol. 5, 2010, doi: 10.1109/ICETC.2010.5530064.
[13] Omer Aslan, Abdullah Asim Yilmaz, "A New Malware Classification Framework Based on Deep Learning Algorithms," IEEE Access, vol. 9, pp. 87936-87951, 2021, doi: 10.1109/ACCESS.2021.3089586.
[14] Sudhir Kumar Pandey, B.M. Mehtre, "Performance of malware detection tools: A comparison," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014, pp. 1811-1817, doi: 10.1109/ICACCCT.2014.7019422.
[15] Y. Pan, X. Ge, C. Fang and Y. Fan, "A Systematic Literature Review of Android Malware Detection Using Static Analysis," in IEEE Access, vol. 8, pp. 116363-116379, 2020, doi: 10.1109/ACCESS.2020.3002842.
[16] Sweta Khatana, Anurag Jain, "Malware Detection Using the Behavioral Analysis of the Web based Applications and User," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1026-1031, 2019.
[17] Jamuna Rani S., Vagdevi S., "Online Intrusion and Security Measures in Social Networking Environment – A Survey", International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.39-45, 2020.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.