Metamorphic malware detection using machine learning
Commercially available antivirus software relies on a traditional malware detection technique known as signature-based malware detection which fails to counter unknown signatures of malicious software. Obfuscated malware such as polymorphic or metamorphic are capable of generating a unique signature...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/93122/1/MohammedHasanAliMSKE2020.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.93122 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.931222021-11-19T03:23:52Z Metamorphic malware detection using machine learning 2020 Ahmed Ali, Mohammed Hasan Ali TK Electrical engineering. Electronics Nuclear engineering Commercially available antivirus software relies on a traditional malware detection technique known as signature-based malware detection which fails to counter unknown signatures of malicious software. Obfuscated malware such as polymorphic or metamorphic are capable of generating a unique signature at each time of executing the malware code to avoid being detected by antivirus software. However, some imperative portions of the malicious code remain unaltered after the obfuscation process. This research project proposes an alternative method of malware detection by utilizing machine learning techniques in which informative textual string attributeswere employed as features in with the aim to increase the classifier accuracy and to decrease the computational overhead. In order to develop machine learning classifier models, two phases of learning were applied which are training and testing phases. In this project, benign and malware executable files were collected, then converted to assembly code using disassembler such as IDA Pro disassembler, and then preprocessed to determine the most significant features to aid the machine learning training stage. In addition, part of the collected dataset was obfuscated to be used as testing files in order to test the accuracy of the classifier. The obtained results generated by WEKA platform show that the generative classifier model based on the SMO algorithm has the highest accuracy level and the lowest time taken to build the model. Exploiting the most important textual strings as machine learning training features reduced the computational complexity in terms of the time taken to generate the model and the computing resources such as processing power and memory space. Malware classification using machine learning algorithms proofed to be more effective than traditional signature-based antivirus scanners. 2020 Thesis http://eprints.utm.my/id/eprint/93122/ http://eprints.utm.my/id/eprint/93122/1/MohammedHasanAliMSKE2020.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:135979 masters Universiti Teknologi Malaysia, Faculty of Engineering - School of Electrical Engineering Faculty of Engineering - School of Electrical Engineering |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK Electrical engineering Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering Electronics Nuclear engineering Ahmed Ali, Mohammed Hasan Ali Metamorphic malware detection using machine learning |
description |
Commercially available antivirus software relies on a traditional malware detection technique known as signature-based malware detection which fails to counter unknown signatures of malicious software. Obfuscated malware such as polymorphic or metamorphic are capable of generating a unique signature at each time of executing the malware code to avoid being detected by antivirus software. However, some imperative portions of the malicious code remain unaltered after the obfuscation process. This research project proposes an alternative method of malware detection by utilizing machine learning techniques in which informative textual string attributeswere employed as features in with the aim to increase the classifier accuracy and to decrease the computational overhead. In order to develop machine learning classifier models, two phases of learning were applied which are training and testing phases. In this project, benign and malware executable files were collected, then converted to assembly code using disassembler such as IDA Pro disassembler, and then preprocessed to determine the most significant features to aid the machine learning training stage. In addition, part of the collected dataset was obfuscated to be used as testing files in order to test the accuracy of the classifier. The obtained results generated by WEKA platform show that the generative classifier model based on the SMO algorithm has the highest accuracy level and the lowest time taken to build the model. Exploiting the most important textual strings as machine learning training features reduced the computational complexity in terms of the time taken to generate the model and the computing resources such as processing power and memory space. Malware classification using machine learning algorithms proofed to be more effective than traditional signature-based antivirus scanners. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Ahmed Ali, Mohammed Hasan Ali |
author_facet |
Ahmed Ali, Mohammed Hasan Ali |
author_sort |
Ahmed Ali, Mohammed Hasan Ali |
title |
Metamorphic malware detection using machine learning |
title_short |
Metamorphic malware detection using machine learning |
title_full |
Metamorphic malware detection using machine learning |
title_fullStr |
Metamorphic malware detection using machine learning |
title_full_unstemmed |
Metamorphic malware detection using machine learning |
title_sort |
metamorphic malware detection using machine learning |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Engineering - School of Electrical Engineering |
granting_department |
Faculty of Engineering - School of Electrical Engineering |
publishDate |
2020 |
url |
http://eprints.utm.my/id/eprint/93122/1/MohammedHasanAliMSKE2020.pdf |
_version_ |
1747818635811880960 |