Application of Hybrid Machine Learning to Detect and Remove Malware
Journal Title: Transactions on Machine Learning and Artificial Intelligence - Year 2015, Vol 3, Issue 4
Abstract
Anti-malware software traditionally employ methods of signature-based and heuristic-based detection. These detection systems need to be manually updated with new behaviors to detect new, unknown, or adapted malware. Our goal is to create a new malware detection solution that will serve three purposes: to automatically identify and classify unknown files on a spectrum of malware severity; to introduce a hybrid machine learning approach to detect modified malware traces; and to increase the accuracy of detection results. Our solution is accomplished through the use of data mining and machine learning concepts and algorithms. We perform two types of data mining on samples, extracting n-grams and PE features that are used for our machine learning environment. We also introduce a new hybrid learning approach that utilizes both supervised and unsupervised machine learning in a two-layer protocol. A supervised algorithm is applied to classify if a file is considered malware or benign. The files classified as malware will then be categorized and then assigned on a severity spectrum using the SOFM unsupervised algorithm.
Authors and Affiliations
Richard R. Yang, Victor Kang, Sami Albouq, Mohamed Zohdy
Some Properties of Associates of Subsets of FSP-Points Set
In this paper, based upon Fs-set theory [1], we define a crisp Fs-points set FSP(..) for given Fs-set .. and establish a pair of relations between collection of all Fs-subsets of a given Fs-set .. and collection of all c...
Detection of Damage in Rail Head by Using SAFE Method
The first cause of train derailment incidents is due to the transverse defect which occurs in the railhead. It is typically an open or internal crack developing in a plane which is generally perpendicular to the directio...
Implications of System Identification Techniques on ANFIS E-learners Activities Models-A Comparative Study
Efficient e-learners activities model is essential for real time identifications and adaptive responses. Determining the most effective Neuro- Fuzzy model amidst plethora of techniques for structure and parameter identif...
Novel Compact CPW LowPass Filter Integrating Periodic Triangle DGS Cells
In this paper, we introduce a new periodic structure for CPW of a low pass filter based on the DGS technique with triangle slot cell forme. The proposed structure is a minuature low pass filter that exhibits low insertio...
Face Spoofing and Counter-Spoofing: A Survey of State-of-the-art Algorithms
In the current scenario of biometric-based identity verification, a face is still being proved to be an essential physiological evidence for successful person identification without letting know the target. Nevertheless,...