CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Virus Detection using Artificial Neural Networks

by Shivani Shah, Himali Jani, Sathvik Shetty, Kiran Bhowmick
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 5
Year of Publication: 2013
Authors: Shivani Shah, Himali Jani, Sathvik Shetty, Kiran Bhowmick
10.5120/14572-2695

Shivani Shah, Himali Jani, Sathvik Shetty, Kiran Bhowmick . Virus Detection using Artificial Neural Networks. International Journal of Computer Applications. 84, 5 ( December 2013), 17-23. DOI=10.5120/14572-2695

@article{ 10.5120/14572-2695,
author = { Shivani Shah, Himali Jani, Sathvik Shetty, Kiran Bhowmick },
title = { Virus Detection using Artificial Neural Networks },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 5 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number5/14572-2695/ },
doi = { 10.5120/14572-2695 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:00:07.611996+05:30
%A Shivani Shah
%A Himali Jani
%A Sathvik Shetty
%A Kiran Bhowmick
%T Virus Detection using Artificial Neural Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 5
%P 17-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A virus is defined as a program that spreads or replicates by copying itself, and generally has malicious effects. The antivirus systems used today mainly detect malware on the basis of known virus patterns, making detection of a new virus very difficult. This deficiency can be overcome by training an artificial neural network with the inputs from Portable Executable (PE) Structure of executable files, as they learn from the training data and will be able to identify unknown virus patterns. PE Structure contains various fields by which one can identify virus infected executable files from the legitimate ones without executing them, and Fisher Score can be used to select the most relevant features (fields) to speed up the analysis. A new technique of identifying virus infected files by using Fisher Score and applying them as input to the neural network is proposed.

References
  1. DimaStopel, ZviBoger, Robert Moskovitch, Yuval Shahar and Yuval Elovici, "Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques".
  2. Hassan Khan, FauzanMirza and Syed Ali Khayam, "Determining malicious executable distinguishing attributes and low-complexity detection", J ComputVirol DOI 10. 1007/s11416-010-0140-6.
  3. AltyebAltaher, SureswaranRamadass and Ammar Ali, "Computer Virus Detection Using Features Ranking and Machine Learning", Australian Journal of Basic and Applied Sciences, 5(9): 1482-1486, 2011: ISSN 1991-8178.
  4. QuanquanGu, Zhenhui Li, Jiawei Han, "Generalized Fisher Score for Feature Selection".
  5. Xiaofei He, Deng Cai, ParthaNiyogi, "Laplacian Score for Feature Selection".
  6. Zheng Zhao, Lei Wang, Huan Liu, and Jieping Ye, "On Similarity Preserving Feature Selection", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING.
  7. Daoqiang Zhang1, Songcan Chen1 and Zhi-Hua Zhou2, "Constraint Score: A New Filter Method for Feature Selection with Pairwise Constraints".
  8. Koji Tsuda, Motoaki Kawanabe and Klaus-RobertMuller, "Clustering with the Fisher Score".
  9. B. Azhagusundari, Antony SelvadossThanamani, "Feature Selection based on Information Gain", International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-2, Issue-2, January 2013.
  10. RahmanMukras, NirmalieWiratunga, Robert Lothian, SutanuChakraborti, and David Harper, "Information Gain Feature Selection for Ordinal Text Classification using Probability Re-distribution".
  11. ZhaohuiZheng, Xiaoyun Wu, RohiniSrihari, "Feature Selection for Text Categorization on Imbalanced Data".
  12. Phayung Meesad1, Pudsadee Boonrawd2 and Vatinee Nuipian2,3, "A Chi-Square-Test for Word Importance Differentiation in Text Classification", 2011 International Conference on Information and Electronics Engineering IPCSIT vol. 6 (2011) © (2011) IACSIT Press, Singapore.
  13. George Forman, "An Extensive Empirical Study of Feature Selection Metrics for Text Classification", Journal of Machine Learning Research 3 (2003) 1289-1305 ;Submitted 5/02; Published 3/03.
  14. Anuj Sharma, ShubhamoyDey, "Performance Investigation of Feature Selection Methods and Sentiment Lexicons for Sentiment Analysis", Special Issue of International Journal of Computer Applications (0975 – 8887) on Advanced Computing and Communication Technologies for HPC Applications - ACCTHPCA, June 2012.
  15. TodorGanchev, PanagiotisZervas, Nikos Fakotakis, George Kokkinakis, "Benchmarking Feature Selection Techniques on the Speaker Verification Task".
  16. Huan Liu and Lei Yu, "Toward Integrating Feature Selection Algorithms for Classification and Clustering", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 17, NO. 4, APRIL 2005.
  17. Eric Filiol, "Malware pattern scanning schemes secure against black-box analysis", Springer-Verlag France 2006.
  18. Yanfang Ye , Dingding Wang , Tao Li , Dongyi Ye, Qingshan Jiang, "An intelligent PE-malware detection system based on association mining, " Springer-Verlag France 2008.
  19. Zheng Zhao, Fred Morstatter, Shashvata Sharma, Salem Alelyani, AneethAnand, Huan Liu, "Advancing Feature Selection Research- ASU Feature Selection Repository".
  20. Yibin Liao, "PE-Header-Based Malware Study and Detection".
  21. Isabelle Guyon, Andr´eElisseeff, " An Introduction to Variable and Feature Selection", Journal of Machine Learning Research 3 (2003) 1157-1182.
  22. Joel Yonts, "Attributes of Malicious Files", SANS Institute InfoSec Reading Room.
  23. Lei Yu, Huan Liu, "Efficient Feature Selection via Analysis of Relevance and Redundancy", Journal of Machine Learning Research 5 (2004) 1205–1224, Submitted 1/04; Revised 5/04; Published 10/04.
  24. Jianqing Fan, Richard Samworth, Yichao Wu, "Ultrahigh Dimensional Feature Selection: Beyond The Linear Model", Journal of Machine Learning Research 10 (2009) 2013-2038, Submitted 12/08; Revised 5/09; Published 9/09.
  25. L. Ladha, T. Deepa, "FEATURE SELECTION METHODS AND ALGORITHMS", L. Ladha et al. / International Journal on Computer Science and Engineering(IJCSE).
Index Terms

Computer Science
Information Sciences

Keywords

PE Structure Feature Fisher Score Artificial Neural Network