PEDM: Pre-Ensemble Decision Making for Malware Identification and Web Files

作者: Elham Velayati , Seyed Mehdi Hazrati Fard

DOI: 10.1109/ICWR49608.2020.9122322

关键词:

摘要: Connecting your system or device to an insecure network can create the possibility of infecting by unwanted files. Malware is every malicious code that has potential harm any computer network. So, detecting harmful files a crucial duty and important role in system. Machine learning approaches use variety features such as Opcodes, Bytecodes, System-calls achieve accurate malware identification. Each these feature sets provides unique semantic view, while, considering effect altogether more reliable detect attacks. disguise itself some views, but hiding all views will be much difficult. Multi-View Learning (MVL) outstanding approach considers multiple problem improve overall performance. In this paper, inspiring MVL proposed incorporate various exploit complementary information identify file. way, consensus used minimize error classifier based on sparse representation. To show generalization power method, datasets are employed. Experimental results indicate addition high performance, method advantage overcoming imbalanced conditions.

参考文章(31)
Igor Santos, Yoseba K Penya, Jaime Devesa, Pablo G Bringas, None, N-GRAMS-BASED FILE SIGNATURES FOR MALWARE DETECTION Proceedings of the 11th International Conference on Enterprise Information. pp. 317- 320 ,(2009) , 10.5220/0001863603170320
Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici, Unknown Malcode Detection Using OPCODE Representation european conference on intelligence and security informatics. pp. 204- 215 ,(2008) , 10.1007/978-3-540-89900-6_21
Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar, Maghsoud Abbaspour, A static heuristic approach to detecting malware targets Security and Communication Networks. ,vol. 8, pp. 3015- 3027 ,(2015) , 10.1002/SEC.1228
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq, PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime recent advances in intrusion detection. pp. 121- 141 ,(2009) , 10.1007/978-3-642-04342-0_7
Mehmet Ozdemir, Ibrahim Sogukpinar, An Android Malware Detection Architecture based on Ensemble Learning Transactions on Machine Learning and Artificial Intelligence. ,vol. 2, pp. 90- 106 ,(2014) , 10.14738/TMLAI.23.261
Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard, Ali Hamzeh, A survey on heuristic malware detection techniques conference on information and knowledge technology. pp. 113- 120 ,(2013) , 10.1109/IKT.2013.6620049
Rich Caruana, Alexandru Niculescu-Mizil, Geoff Crew, Alex Ksikes, Ensemble selection from libraries of models Twenty-first international conference on Machine learning - ICML '04. pp. 18- ,(2004) , 10.1145/1015330.1015432
Allen Y. Yang, S. Shankar Sastry, Arvind Ganesh, Yi Ma, Fast ℓ1-minimization algorithms and an application in robust face recognition: A review 2010 IEEE International Conference on Image Processing. pp. 1849- 1852 ,(2010) , 10.1109/ICIP.2010.5651522
Daniel Bilar, Opcodes as predictor for malware International Journal of Electronic Security and Digital Forensics. ,vol. 1, pp. 156- 168 ,(2007) , 10.1504/IJESDF.2007.016865
Eitan Menahem, Asaf Shabtai, Lior Rokach, Yuval Elovici, Improving malware detection by applying multi-inducer ensemble Computational Statistics & Data Analysis. ,vol. 53, pp. 1483- 1494 ,(2009) , 10.1016/J.CSDA.2008.10.015