CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Classification of Malware using Machine learning and Deep learning Techniques

by B.A.S. Dilhara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 32
Year of Publication: 2021
Authors: B.A.S. Dilhara
10.5120/ijca2021921708

B.A.S. Dilhara . Classification of Malware using Machine learning and Deep learning Techniques. International Journal of Computer Applications. 183, 32 ( Oct 2021), 12-17. DOI=10.5120/ijca2021921708

@article{ 10.5120/ijca2021921708,
author = { B.A.S. Dilhara },
title = { Classification of Malware using Machine learning and Deep learning Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2021 },
volume = { 183 },
number = { 32 },
month = { Oct },
year = { 2021 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number32/32137-2021921708/ },
doi = { 10.5120/ijca2021921708 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:59.608437+05:30
%A B.A.S. Dilhara
%T Classification of Malware using Machine learning and Deep learning Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 32
%P 12-17
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The threats impose by the cyber-attacks due to malicious software (malware) have been increasing drastically with the evolution of information technology. Since people use web applications on a daily basis these malware attacks have become challenging. There have been various attacks affecting confidentiality, integrity and availability of data which has become a major security concern. Though the manual inspection and classification methods seemed to bring up some light to this facet, these methods are no longer considered effective, since they are time consuming and inefficient. With the high-rate malware spreading, it is a necessity to come up with some novelty approach to classify them as malware or benign software. So, this is where machine learning comes up as a novelty approach in malware classification. In this paper, a malware dataset was used on several machine learning classifiers like Support Vector Machinery (SVM) and Gaussian Naive Bayes classifiers were used and Recurrent Neural Network (RNN) and Convolutional Neural Networks (CNN) were used as the deep learning classifiers. Although there are many other methods for malware classification, a machine learning approach could be efficient and effective in detecting malicious software. Thus, the primary objective of this paper is to provide an insight to the machine learning approach in malware classification by depicting, which is the best classifier of the listed, that can effectively classify malware based on their accuracy or precision. In conclusion, based on the results this recognizes Recurrent Neural networks as the best approach that recorded the highest accuracy.

References
  1. B. Cakir and E. Dogdu, “Malware classification using deep learning methods,” Proc. ACMSE 2018 Conf., vol. 2018-January, no. April 2018.
  2. A. P. Namanya, A. Cullen, I. U. Awan, and J. P. Disso, “The World of Malware: An Overview,” Proc. - 2018 IEEE 6th Int. Conf. Futur. Internet Things Cloud, FiCloud 2018, no. September, pp. 420–427, 2018.
  3. D. Gibert, C. Mateu, and J. Planes, “The rise of machine learning for detection and classification of malware: Research developments, trends and challenges,” J. Netw. Comput. Appl., vol. 153, no. July 2019, p. 102526, 2020. [Online].Available:https://doi.org/10.1016/j.jnca.2019.102526
  4. R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, and S. Venkatraman, “Robust Intelligent Malware Detection Using Deep Learning,” IEEE Access, vol. 7, pp. 46 717–46 738, 2019.
  5. V. Menger, F. Scheepers, and M. Spruit, “Comparing deep learning and classical machine learning approaches for predicting inpatient violence incidents from clinical text,” Applied Sciences, vol. 8, no. 6, p. 981, Jun. 2018. [Online]. Available: https://doi.org/10.3390/app8060981
  6. C. Liu, L. Wang, B. Lang, and Y. Zhou, “Finding effective classifier for malicious URL detection,” in Proceedings of the 2018 2nd International Conference on Management Engineering, Software Engineering and Service Sciences - ICMSS 2018. ACM Press, 2018. [Online].Available:https://doi.org/10.1145/3180374.3181352
  7. Z. Cui, F. Xue, X. Cai, Y. Cao, G. G. Wang, and J. Chen, “Detection of Malicious Code Variants Based on Deep Learning,” IEEE Trans. Ind. Informatics, vol. 14, no. 7, pp. 3187–3196, 2018.
  8. B. B. Benuwa, Y. Zhan, B. Ghansah, D. K. Wornyo, and F. B. Kataka, “A review of deep machine learning,” Int. J. Eng. Res. Africa, vol. 24, no. February 2017, pp. 124–136, 2016.
  9. Y. Kim, Y. Jernite, D. Sontag, and A. M. Rush, “Character-Aware neural language models,” 30th AAAI Conf. Artif. Intell. AAAI 2016, pp. 2741– 2749, 2016.
  10. M. Rhode, P. Burnap, and K. Jones, “Early-stage malware prediction using recurrent neural networks,” Comput. Secur., vol. 77, no. December 2017, pp. 578–594, 2018. [Online]. Available: https://doi.org/10.1016/j.cose.2018.05.010
  11. R. Olson, G. James, and R. Howard, Cyber Security Cyber Security. Springer Singapore, 2011. [Online]. Available: http://dx.doi.org/10.1007/978-981-10-8536-9 8
  12. I. Firdausi, C. Lim, A. Erwin, and A. S. Nugroho, “Analysis of machine learning techniques used in behavior-based malware detection,” Proc. - 2010 2nd Int. Conf. Adv. Comput. Control Telecommun. Technol. ACT 2010, pp. 201–203, 2010.
  13. A. M. M. Muhammad Furqan Rafique, Aqsa Saeed Qureshi, Asifullah Khan, Jin Young Kim, “Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique Muhammad,” pp. 1–20.
  14. Saravana, “Malware detection,” Apr 2018. [Online]. Available: https://www.kaggle.com/nsaravana/malware-detection.
  15. L. Zhang, Y. Zhu, P. Shi, and Q. Lu, “Performance analysis,” Stud. Syst. Decis. Control, vol. 53, pp. 59–85, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Malware Classification Machine Learning Deep Learning Binary Classification