DocumentCode :
1855742
Title :
Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection
Author :
Firdausi, Ivan ; Lim, Charles ; Erwin, Alva ; Nugroho, Anto Satriyo
Author_Institution :
Dept. of Inf. Technol., Swiss German Univ., Tangerang, Indonesia
fYear :
2010
fDate :
2-3 Dec. 2010
Firstpage :
201
Lastpage :
203
Abstract :
The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient compared against the high spreading rate of malware. Hence, automated behavior-based malware detection using machine learning techniques is considered a profound solution. The behavior of each malware on an emulated (sandbox) environment will be automatically analyzed and will generate behavior reports. These reports will be preprocessed into sparse vector models for further machine learning (classification). The classifiers used in this research are k-Nearest Neighbors (kNN), Naïve Bayes, J48 Decision Tree, Support Vector Machine (SVM), and Multilayer Perceptron Neural Network (MlP). Based on the analysis of the tests and experimental results of all the 5 classifiers, the overall best performance was achieved by J48 decision tree with a recall of 95.9%, a false positive rate of 2.4%, a precision of 97.3%, and an accuracy of 96.8%. In summary, it can be concluded that a proof-of-concept based on automatic behavior-based malware analysis and the use of machine learning techniques could detect malware quite effectively and efficiently.
Keywords :
Bayes methods; Internet; decision trees; invasive software; learning (artificial intelligence); multilayer perceptrons; pattern classification; support vector machines; Internet; J48 decision tree; MLP neural nets; Naive Bayes method; SVM; automated behavior-based malware detection; k-nearest neighbors; kNN; machine learning; malware analysis; multilayer perceptron neural network; sparse vector model; support vector machine; Accuracy; Classification algorithms; Machine learning; Malware; Monitoring; Support vector machine classification; behavior analysis; classification; data mining; dynamic analysis; machine learning; malware analysis; malware detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference on
Conference_Location :
Jakarta
Print_ISBN :
978-1-4244-8746-2
Electronic_ISBN :
978-0-7695-4269-0
Type :
conf
DOI :
10.1109/ACT.2010.33
Filename :
5675808
Link To Document :
بازگشت