{"title":"基于集成学习和文件监控的恶意软件检测","authors":"Tilak Vignesh, Sowhith Reddy, Sonit Kumar, Akshat Chourey, Chandrashekhar Pomu Chavan","doi":"10.1109/ICSTSN57873.2023.10151567","DOIUrl":null,"url":null,"abstract":"In essence, malware refers to harmful programs that cybercriminals use to infiltrate a specific machine or an organisation’s complete network. It takes advantage of flaws in legitimate software (such a browser or plugin for an online application) that can be hijacked. ML is widely used to mitigate this problem which is an excellent solution but the problem with this is that it’s possible for ML to falsely detect some files causing system exploits. This paper aims to provide a method to detect malware using ensemble learning and further monitor files based on a probability value assigned to it by the model.","PeriodicalId":325019,"journal":{"name":"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Malware Detection Using Ensemble Learning and File Monitoring\",\"authors\":\"Tilak Vignesh, Sowhith Reddy, Sonit Kumar, Akshat Chourey, Chandrashekhar Pomu Chavan\",\"doi\":\"10.1109/ICSTSN57873.2023.10151567\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In essence, malware refers to harmful programs that cybercriminals use to infiltrate a specific machine or an organisation’s complete network. It takes advantage of flaws in legitimate software (such a browser or plugin for an online application) that can be hijacked. ML is widely used to mitigate this problem which is an excellent solution but the problem with this is that it’s possible for ML to falsely detect some files causing system exploits. This paper aims to provide a method to detect malware using ensemble learning and further monitor files based on a probability value assigned to it by the model.\",\"PeriodicalId\":325019,\"journal\":{\"name\":\"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSTSN57873.2023.10151567\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSTSN57873.2023.10151567","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malware Detection Using Ensemble Learning and File Monitoring
In essence, malware refers to harmful programs that cybercriminals use to infiltrate a specific machine or an organisation’s complete network. It takes advantage of flaws in legitimate software (such a browser or plugin for an online application) that can be hijacked. ML is widely used to mitigate this problem which is an excellent solution but the problem with this is that it’s possible for ML to falsely detect some files causing system exploits. This paper aims to provide a method to detect malware using ensemble learning and further monitor files based on a probability value assigned to it by the model.