36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

Malware cases are increasing both in numbers and fatality. Hackers design malware to compromise systems security mostly confidentiality, integrity, and availability. Malware elimination techniques exist but the malware must be detected first. Malware detection techniques still have weaknesses of high false positive/negatives rates. The emergency of polymorphic malware has made the situation worse. Recent studies have shown data mining to be promising in identifying malware by analyzing API calls. However, in this approach, a file is detected as malicious or not. It is not classified on to…mehr

Produktbeschreibung
Malware cases are increasing both in numbers and fatality. Hackers design malware to compromise systems security mostly confidentiality, integrity, and availability. Malware elimination techniques exist but the malware must be detected first. Malware detection techniques still have weaknesses of high false positive/negatives rates. The emergency of polymorphic malware has made the situation worse. Recent studies have shown data mining to be promising in identifying malware by analyzing API calls. However, in this approach, a file is detected as malicious or not. It is not classified on to which malware class it belongs. This makes its elimination harder as elimination schemes are mostly class based. Classification as a post detection process is important if the malware is to be eliminated from the system. We experiment on the use of data mining approach to classify malware using 4-gram API system calls. We use Windows Portable Executables (PE) with their corresponding API calls. Using the Cuckoo sandbox. Relevant 4-gram API call features are extracted using Term Frequency-Inverse Document Frequency(TF-IDF). Machine Learning algorithms are then applied to classify the malware.
Autorenporträt
Allan Ninyesiga obteve um Mestrado em Informática com uma Especialização em Segurança Informática da Universidade Tecnológica e de Gestão do Uganda em 2017. Devido ao amplo aumento na utilização de Sistemas TIC, Allan tomou um caminho para desafiar aqueles (o malware) que comprometem a segurança dos sistemas por esta investigação.