Show simple item record

dc.contributor.authorAli, M
dc.contributor.authorShiaeles, S
dc.contributor.authorBendiab, G
dc.contributor.authorGhita, B
dc.date.accessioned2021-05-18T11:46:57Z
dc.date.available2021-05-18T11:46:57Z
dc.date.issued2020-10-26
dc.identifier.issn1450-5843
dc.identifier.issn2079-9292
dc.identifier.otherARTN 1777
dc.identifier.urihttp://hdl.handle.net/10026.1/17131
dc.description.abstract

<jats:p>Detection and mitigation of modern malware are critical for the normal operation of an organisation. Traditional defence mechanisms are becoming increasingly ineffective due to the techniques used by attackers such as code obfuscation, metamorphism, and polymorphism, which strengthen the resilience of malware. In this context, the development of adaptive, more effective malware detection methods has been identified as an urgent requirement for protecting the IT infrastructure against such threats, and for ensuring security. In this paper, we investigate an alternative method for malware detection that is based on N-grams and machine learning. We use a dynamic analysis technique to extract an Indicator of Compromise (IOC) for malicious files, which are represented using N-grams. The paper also proposes TF-IDF as a novel alternative used to identify the most significant N-grams features for training a machine learning algorithm. Finally, the paper evaluates the proposed technique using various supervised machine-learning algorithms. The results show that Logistic Regression, with a score of 98.4%, provides the best classification accuracy when compared to the other classifiers used.</jats:p>

dc.format.extent1777-1777
dc.languageen
dc.language.isoen
dc.publisherMDPI AG
dc.subjectmalware
dc.subjectdynamic analysis
dc.subjectsandbox
dc.subjectSNDBOX
dc.subjectN-grams
dc.subjectAPI call
dc.subjectmachine learning
dc.subjectLogistic Regression
dc.subjectNaive Bayes
dc.subjectRandom Forests
dc.subjectDecision Tree
dc.titleMALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000592765700001&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.issue11
plymouth.volume9
plymouth.publication-statusPublished online
plymouth.journalElectronics
dc.identifier.doi10.3390/electronics9111777
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-10-17
dc.rights.embargodate2021-6-8
dc.identifier.eissn2079-9292
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.3390/electronics9111777
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-10-26
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV