Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/4638
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rajneekant, . | - |
dc.contributor.author | Kishore, Pushkar | - |
dc.contributor.author | Gond, Bishwajit Prasad | - |
dc.contributor.author | Mohapatra, Durga Prasad | - |
dc.date.accessioned | 2024-08-07T04:49:54Z | - |
dc.date.available | 2024-08-07T04:49:54Z | - |
dc.date.issued | 2024-07 | - |
dc.identifier.citation | IEEE International Conference on Smart Power Control and Renewable Energy ((ICSPCRE), NIT Rourkela, India, 19-21 July 2024 | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/4638 | - |
dc.description | Copyright belongs to proceeding publisher | en_US |
dc.description.abstract | Malware samples have been widely used for unauthorized objectives. New varieties of malware are discovered daily. The application of machine learning (ML) for system and network security is one of the key areas of current study due to its effectiveness and rapid advancement over the past decade. In our research work, we explored the implementation of ML in malware classification and analysis by enabling dynamic and adaptive threat recognition. This research introduces a pioneering methodology for categorizing malware samples into their respective families by leveraging ML techniques based on application programming interface (API) sequences and arguments. The experiment encompassed nine distinct malware families, along with benign samples, collected for analysis. Several ML models are used for feature learning and classification. These include convolutional neural network (CNN), naive bayes, random forest, and XGBoost. The outcomes of the experiments show that there are significant disparities in the performance of the models. Specifically, SGD attained an accuracy of 79.90%, CNN achieved 72.53% accuracy, Naive Bayes demonstrated 8.7% accuracy, Random Forest yielded 92.37% accuracy, while XGBoost emerged as the front runner with an accuracy of 98.87%. These findings show the effectiveness of employing API sequences and arguments for malware classification in XGBoost. XGBoost accurately categorizes malicious samples into their respective families. | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Malware Classification | en_US |
dc.subject | Application programming interface | en_US |
dc.subject | Threat Recognition | en_US |
dc.subject | Security | en_US |
dc.title | Enhancing Malware Classification with Machine Learning: A Comparative Analysis of API Sequence-Based Techniques | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2024_ICSPCRE_Rajneekant_Enhancing.pdf | 362.77 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.