Malware Detection using Deep Neural Networks on Imbalanced Data

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 130

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_MJEE-16-4_006

تاریخ نمایه سازی: 25 بهمن 1401

چکیده مقاله:

Through the use of malware, particularly JavaScript, cybercriminals have turned online applications into one of their main targets for impersonation. Detection of such dangerous code in real-time, therefore, becomes crucial in order to prevent any harmful action. By categorizing the salient characteristics of the malicious code, this study suggests an effective technique for identifying malicious Java scripts that were previously unknown, employing an interceptor on the client side. By employing the wrapper approach for dimensionality reduction, a feature subset was generated. In this paper, we propose an approach for handling the malware detection task in imbalanced data situations. Our approach utilizes two main imbalanced solutions namely, Synthetic Minority Over Sampling Technique (SMOTE) and Tomek Links with the object of augmenting the data and then applying a Deep Neural Network (DNN) for classifying the scripts. The conducted experiments demonstrate the efficient performance of our approach and it achieves an accuracy of ۹۴.۰۰%.

نویسندگان

Mohammed Abdulkreem Mohammed

Department of Anesthesia Techniques, Al-Noor University College, Bartella, Iraq

Drai Ahmed Smait

The University of Mashreq, Iraq

Mustafa Al-Tahai

Medical technical college/ Al-Farahidi University, Baghdad, Iraq

Israa S. Kamil

Medical Laboratories Techniques Department, Al-Mustaqbal University College, Babylon, Iraq

Kadhum Al-Majdi

Department of biomedialc engineering, Ashur University College, Baghdad, Iraq

Shahad K. Khaleel

Al-Esraa University College, Baghdad, Iraq

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Rai, Mahima, and Hardwari Mandoria. "A study on cyber crimes ...
  • Gursoy, Mehmet Emre, Acar Tamersoy, Stacey Truex, Wenqi Wei, and ...
  • Fang, Yong, Cheng Huang, Yu Su, and Yaoyao Qiu. "Detecting ...
  • Rodríguez, Germán E., Jenny G. Torres, Pamela Flores, and Diego ...
  • Tariq, Iram, Muddassar Azam Sindhu, Rabeeh Ayaz Abbasi, Akmal Saeed ...
  • Mokbal, Fawaz Mahiuob Mohammed, Wang Dan, Wang Xiaoxi, Zhao Wenbin, ...
  • Odun-Ayo, Isaac, Williams Toro-Abasi, Marion Adebiyi, and Oladapo Alagbe. "An ...
  • Usha, G., S. Kannimuthu, P. D. Mahendiran, Anusha Kadambari Shanker, ...
  • Kadhim, R., and M. Gaata. "A hybrid of CNN and ...
  • Alsaffar, Mohammad, Saud Aljaloud, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, ...
  • Nassif, Ali Bou, Ismail Shahin, Imtinan Attili, Mohammad Azzeh, and ...
  • Obaid, Kavi B., Subhi Zeebaree, and Omar M. Ahmed. "Deep ...
  • Karimi, Davood, Haoran Dou, Simon K. Warfield, and Ali Gholipour. ...
  • Nourani, Vahid, Zahra Razzaghzadeh, Aida Hosseini Baghanam, and Amir Molajou. ...
  • Sharghi, Elnaz, Vahid Nourani, Hessam Najafi, and Amir Molajou. "Emotional ...
  • Nourani, Vahid, Amir Molajou, Selin Uzelaltinbulat, and Fahreddin Sadikoglu. "Emotional ...
  • Jia, Sen, Shuguo Jiang, Zhijie Lin, Nanying Li, Meng Xu, ...
  • Kaur, Harsurinder, Husanbir Singh Pannu, and Avleen Kaur Malhi. "A ...
  • Zhang, Wei, Xiang Li, Xiao-Dong Jia, Hui Ma, Zhong Luo, ...
  • Ishaq, Abid, Saima Sadiq, Muhammad Umer, Saleem Ullah, Seyedali Mirjalili, ...
  • Swana, Elsie Fezeka, Wesley Doorsamy, and Pitshou Bokoro. "Tomek Link ...
  • Farahani, Farzad V., Waldemar Karwowski, and Nichole R. Lighthall. "Application ...
  • Khan, Asifullah, Anabia Sohail, Umme Zahoora, and Aqsa Saeed Qureshi. ...
  • Kattenborn, Teja, Jens Leitloff, Felix Schiefer, and Stefan Hinz. "Review ...
  • Capra, Maurizio, Beatrice Bussolino, Alberto Marchisio, Muhammad Shafique, Guido Masera, ...
  • Boulent, Justine, Samuel Foucher, Jérôme Théau, and Pierre-Luc St-Charles. "Convolutional ...
  • Véstias, Mário P. "A survey of convolutional neural networks on ...
  • Jiao, Jinyang, Ming Zhao, Jing Lin, and Kaixuan Liang. "A ...
  • Ribani, Ricardo, and Mauricio Marengoni. "A survey of transfer learning ...
  • Tulbure, Andrei-Alexandru, Adrian-Alexandru Tulbure, and Eva-Henrietta Dulf. "A review on ...
  • Kovács, György. "Smote-variants: A python implementation of ۸۵ minority oversampling ...
  • Zhang, Hongpo, Lulu Huang, Chase Q. Wu, and Zhanbo Li. ...
  • Raghuwanshi, Bhagat Singh, and Sanyam Shukla. "SMOTE based class-specific extreme ...
  • Kumar, Sujit, Saroj Kr Biswas, and Debashree Devi. "TLUSBoost algorithm: ...
  • Devi, Debashree, and Biswajit Purkayastha. "Redundancy-driven modified Tomek-link based undersampling: ...
  • نمایش کامل مراجع