Feature extraction for enhanced malware detection using genetic algorithm
-
2018-03-19 https://doi.org/10.14419/ijet.v7i2.8.10479 -
Malware, Malware Analysis, Malware Detection, Feature Extraction, Genetic Algorithm -
Abstract
The use of internet has affected almost every field today. With the increase in use of internet, the number of malwares affecting the systems has also increased to a great deal. A number of techniques have been developed by the researchers in order to detect these malwares. The Malware Detection consists of two parts, the analysis part and the detection part. Malwares analysis can be categorized into Static analysis, Dynamic analysis and Hybrid Analysis. The Detection techniques can broadly be classified into Signature based techniques and Behaviour based techniques. A brief introduction of Malware Detection techniques is addressed here. The process of Feature Extraction plays a very important role in determining the efficiency and accuracy of the Malware Detection process. It aims at determining the subset of features that helps better differentiate between the malicious and benign files. We aim to provide a Feature Extraction process based on Genetic process that can be used for Malware Detection.
-
References
[1] Dalimlata, Ms Reetika Singh, “Using Genetic Algorithm and Feature Vector for Detection of Email Wormsâ€, International Journal of Research In Science & Engineering e-ISSN: 2394-8299 Volume 2 Issue 1
[2] (2017) Av-test security institute. https://www.av-test.org/en/statistics/malware/
[3] Jyoti Landage, Prof. M. P. Wankhade,†Malware and Malware Detection Techniques: A Surveyâ€, International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 12, December – 2013
[4] Abhay pratap singh, Dr.S.S handa , “Malware detection using data mining techniquesâ€, International Journal of Advanced Research in Computer and communication Engineering.
[5] What is a computer virus ? https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html
[6] What is Trojan virus? –Definition https://usa.kaspersky.com/resource-center/threats/trojans
[7] What is spyware? –Definition https://www.kaspersky.co.in/resource-center/threats/spyware
[8] Definition of Botnet - https://security.radware.com/ddos-knowledge-center/ddospedia/botnet/
[9] Kirti Mathur, Saroj Hiranwal, “A Survey on Techniques in Detection and Analyzing Malware Executablesâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013
[10] Raviraj Choudhary1, and Ravi Saharan2,†Malware Detection Using Data Mining Techniquesâ€, International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 85-88
[11] Matthew G. Schultz and Eleazar Eskin, Erez Zadok, Salvatore J.Stoflo, “Data Mining Methods for Detection of New Malicious Executablesâ€
[12] Thi Anh Le, Thi Huong Chu, Quang Uy Nguyen, Xuan Hoai Nguyen,â€Malware Detection Using Genetic Programmingâ€, by IEEE International Conference 2014K.
[13] Ke Xu Yinjiu Li and Robert H. Deng “ICCDetector: ICC- Based Malware Detection On Androidâ€, IEEE Transaction On Information Forensic and Security.
[14] Sun Tobiyana, Yukiko Yamaguch, Hagime Shamida, Tomonori Ikuse and Takeshi Yagi ,†Malware Detection with Deep Neural Network Using Process Behaviorâ€, IEEE Annual and Computer software and Application Conference
[15] Shivani Shah, Himali Jani, Sathvik Shetty,Kiran Bhowmick,†Virus Detection using Artificial Neural Networksâ€, International Journal of Computer Applications (0975 – 8887) Volume 84 – No 5, December 2013
[16] O. Ritthoff, R. Klinkenberg, S. Fischer, and I. Mierswa, “A hybrid approach to feature selection and generation using an evolutionary algorithm,†in In Proc. 2002 U.K. Workshop on Computational Intelligence (UKCI-02. University of, 2002, pp. 147–154.
[17] Cristina vatamanu, Dragos gavrilut, Razvan Benchea, Henry Luchian,†Feature extraction using genetic programming and application malwareâ€, IEEE conference.
[18] Anuradha Purohit, Narendra S. Choudhari, ArunaTiwari, Code Bloat Problem in Genetic Programming,†International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013.
[19] Ekta Gandotra, Divya Bansal, Sanjeev Sofat, “Malware Analysis and Classification:A Surveyâ€, Journal of Information Security, 2014, 5, 56-64
[20] Christie Williams, “Applications of Genetic Algorithms to Malware Detection and Creationâ€, December 16,2009.
[21] P. Sivakumar, V. Rajasekaran, K. Ramash Kumar, “Investigation of Intelligent Controllers for Varibale Speeed PFC Buck-Boost Rectifier Fed BLDC Motor Drive,†Journal of Electrical Engineering (Romania), Vol.17, No.4, 2017, pp. 459-471.
[22] P Bala Gopal, K Hari Kishore, B.Praveen Kittu “An FPGA Implementation of On Chip UART Testing with BIST Techniquesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015
[23] S.V.Manikanthan and K.Baskaran “Low Cost VLSI Design Implementation of Sorting Network for ACSFD in Wireless Sensor Networkâ€, CiiT International Journal of Programmable Device Circuits and Systems,Print: ISSN 0974 – 973X & Online: ISSN 0974 – 9624, Issue : November 2011, PDCS112011008.
[24] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.
[25] T. Padmapriya and V. Saminadan, “Distributed Load Balancing for Multiuser Multi-class Traffic in MIMO LTE-Advanced Networksâ€, Research Journal of Applied Sciences, Engineering and Technology (RJASET) - Maxwell Scientific Organization , ISSN: 2040-7459; e-ISSN: 2040-7467, vol.12, no.8, pp:813-822, April 2016.
-
Downloads
-
How to Cite
Srivastava, P., & Raj, M. (2018). Feature extraction for enhanced malware detection using genetic algorithm. International Journal of Engineering & Technology, 7(2.8), 444-449. https://doi.org/10.14419/ijet.v7i2.8.10479Received date: 2018-03-22
Accepted date: 2018-03-22
Published date: 2018-03-19