Sangeeta Rani, K. Tripathi, Yojna Arora, Ajay Kumar
{"title":"基于KNN的恶意软件异常检测分析","authors":"Sangeeta Rani, K. Tripathi, Yojna Arora, Ajay Kumar","doi":"10.1109/iciptm54933.2022.9754044","DOIUrl":null,"url":null,"abstract":"Computer malware development has grown rapidly in the last decade. Nowadays, malicious software (malware) is widely used by cybercriminals to attack computer systems. Malware detection techniques are most effective when they extract discriminative features from the malware, various static and dynamic tools can be used to set up analysis environments. Using traditional methods to classify malware may have worked in the past, but using machine learning algorithms may be more effective in the future as they are designed to keep up with the complexity and speed of malware development. A comprehensive study of anomaly detection of malware based on machine learning algorithms is presented here. This paper also explains about the implementation of k-nearest neighbors of anomaly detection and discusses the challenges associated with implementing malware classifiers. In the final section, we discuss future directives regarding developing an effective malware detection system.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"17 1","pages":"774-779"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis of Anomaly detection of Malware using KNN\",\"authors\":\"Sangeeta Rani, K. Tripathi, Yojna Arora, Ajay Kumar\",\"doi\":\"10.1109/iciptm54933.2022.9754044\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer malware development has grown rapidly in the last decade. Nowadays, malicious software (malware) is widely used by cybercriminals to attack computer systems. Malware detection techniques are most effective when they extract discriminative features from the malware, various static and dynamic tools can be used to set up analysis environments. Using traditional methods to classify malware may have worked in the past, but using machine learning algorithms may be more effective in the future as they are designed to keep up with the complexity and speed of malware development. A comprehensive study of anomaly detection of malware based on machine learning algorithms is presented here. This paper also explains about the implementation of k-nearest neighbors of anomaly detection and discusses the challenges associated with implementing malware classifiers. In the final section, we discuss future directives regarding developing an effective malware detection system.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"17 1\",\"pages\":\"774-779\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9754044\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Anomaly detection of Malware using KNN
Computer malware development has grown rapidly in the last decade. Nowadays, malicious software (malware) is widely used by cybercriminals to attack computer systems. Malware detection techniques are most effective when they extract discriminative features from the malware, various static and dynamic tools can be used to set up analysis environments. Using traditional methods to classify malware may have worked in the past, but using machine learning algorithms may be more effective in the future as they are designed to keep up with the complexity and speed of malware development. A comprehensive study of anomaly detection of malware based on machine learning algorithms is presented here. This paper also explains about the implementation of k-nearest neighbors of anomaly detection and discusses the challenges associated with implementing malware classifiers. In the final section, we discuss future directives regarding developing an effective malware detection system.