基于KNN的恶意软件异常检测分析

Sangeeta Rani, K. Tripathi, Yojna Arora, Ajay Kumar
{"title":"基于KNN的恶意软件异常检测分析","authors":"Sangeeta Rani, K. Tripathi, Yojna Arora, Ajay Kumar","doi":"10.1109/iciptm54933.2022.9754044","DOIUrl":null,"url":null,"abstract":"Computer malware development has grown rapidly in the last decade. Nowadays, malicious software (malware) is widely used by cybercriminals to attack computer systems. Malware detection techniques are most effective when they extract discriminative features from the malware, various static and dynamic tools can be used to set up analysis environments. Using traditional methods to classify malware may have worked in the past, but using machine learning algorithms may be more effective in the future as they are designed to keep up with the complexity and speed of malware development. A comprehensive study of anomaly detection of malware based on machine learning algorithms is presented here. This paper also explains about the implementation of k-nearest neighbors of anomaly detection and discusses the challenges associated with implementing malware classifiers. In the final section, we discuss future directives regarding developing an effective malware detection system.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"17 1","pages":"774-779"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis of Anomaly detection of Malware using KNN\",\"authors\":\"Sangeeta Rani, K. Tripathi, Yojna Arora, Ajay Kumar\",\"doi\":\"10.1109/iciptm54933.2022.9754044\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer malware development has grown rapidly in the last decade. Nowadays, malicious software (malware) is widely used by cybercriminals to attack computer systems. Malware detection techniques are most effective when they extract discriminative features from the malware, various static and dynamic tools can be used to set up analysis environments. Using traditional methods to classify malware may have worked in the past, but using machine learning algorithms may be more effective in the future as they are designed to keep up with the complexity and speed of malware development. A comprehensive study of anomaly detection of malware based on machine learning algorithms is presented here. This paper also explains about the implementation of k-nearest neighbors of anomaly detection and discusses the challenges associated with implementing malware classifiers. In the final section, we discuss future directives regarding developing an effective malware detection system.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"17 1\",\"pages\":\"774-779\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9754044\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在过去十年中,计算机恶意软件的发展迅速。如今,恶意软件被网络犯罪分子广泛用于攻击计算机系统。当恶意软件检测技术从恶意软件中提取鉴别特征时,它们是最有效的,各种静态和动态工具可以用来建立分析环境。在过去,使用传统方法对恶意软件进行分类可能是有效的,但在未来,使用机器学习算法可能会更有效,因为它们的设计是为了跟上恶意软件开发的复杂性和速度。本文对基于机器学习算法的恶意软件异常检测进行了全面的研究。本文还解释了异常检测的k近邻的实现,并讨论了与实现恶意软件分类器相关的挑战。在最后一节中,我们将讨论有关开发有效恶意软件检测系统的未来指令。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of Anomaly detection of Malware using KNN
Computer malware development has grown rapidly in the last decade. Nowadays, malicious software (malware) is widely used by cybercriminals to attack computer systems. Malware detection techniques are most effective when they extract discriminative features from the malware, various static and dynamic tools can be used to set up analysis environments. Using traditional methods to classify malware may have worked in the past, but using machine learning algorithms may be more effective in the future as they are designed to keep up with the complexity and speed of malware development. A comprehensive study of anomaly detection of malware based on machine learning algorithms is presented here. This paper also explains about the implementation of k-nearest neighbors of anomaly detection and discusses the challenges associated with implementing malware classifiers. In the final section, we discuss future directives regarding developing an effective malware detection system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信