Detection by Machine Learning

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Malware Detection by Machine

Learning
Sneha_cowdhury
Index
• Malware
• Malware detection
• Malware attack and how to prevent them
• Malware symptoms
• Machine learning
• Proposed solution with algorithms
• Existing systems for malware detection using machine
learning techniques
• problem identified
• Conclusion
• Reference
Malware

• Malware is software that gets into the system


without user consent to steal the user’s private and
confidential data, including bank details and
passwords. They also generate annoying pop-up ads
and change system settings.
• Type of malware-Trojan
horse ,virus,adware,bots,bugs,rootkits,spyware.
Malware detection

• Malware detector-malware detection is the process


of scanning the computer and files to detect
malware.It is effective at detecting malware because
it involves multiple tools and approaches.It’s not a
one way process,It’s actually quite complex.
• Malware detection method
Malware attack and how to prevent
them
1.Viruses
A Virus is a malicious executable code attached to another executable file
Viruses require human intervention to propagate
Once user download the malisious code onto their devices-often delivered via
malicious advertisements or phising emails the virus spreads throughout their
system
Viruses can modify computer functions and application;copy,delete and exfiltrate
data.
2.Adware
It is capable of downloading or displaying advertisement to the device user.
Not steal any data from the system but it forcing users to see ads.
3.Ransomware
Ransomware lock and encrypts files or devices and forces victims to pay a ransome
in exchange for reentry.while ransomware and malware are often used
synonymously,ransomware is a specific form of malware.
4.Rootkits
A rootkits is malicious software that enables threat actors to remotely access and
control a device.
Rootkits faclitate the spread of other types of malware,including
ransomware,viruses and keyloggers.
Rootkits often go undetected,because once inside a device,they can deactivate
antimalware and antivirus software.
Rootkits typically enter devices and systems through phishing emails and malicious
attachments.
5.Spyware
Spyware is malware that downloads onto a device without the user’s knowledge.
It steals user’s data to sell to advertisers and external user’s.
Spyware can track credentials and obtain bank details and other sensitive data.
It infects devices through malicious apps,links,websites and email attachments.
how to prevent them
• Strong cyber hygiene is the best defense against malware attacks.The
premise of cyber hygiene is similar to that of personal hygiene.If an
organization maintain a high level of health(security),it avoid getting
sick(attacked).
• Cyber hygiene practices that prevent malware attacks include the following:
• Follow email security best practices.
• Deploy email security gateways.
• Avoid clicking links and downloading attachments.
• Implement strong access control.
• Require multifactor authentication.
• Use the principle of least privilege.
• Adopt a zero trust security stategy.
• Monitor for abnormal or suspicious activity.
Malware symptoms

• Computers,they all can produce similar symptoms.Computers that are


infected with malware can exhibit any of the following symptoms:
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or delete filies
• Appearance of strange files,programs,or desktop icons
• Programs running,turning off,or reconfiguring themselves(malware will
often reconfigure or turn off antivirus and firewall programs)
• Strange computer behavior
• Emails/messages being sent automatically and without user’s knowledge(a
friend receives a strange email from you that you did not send)
MACHINE LEARNING
• Machine learning is a method of data analysis
that automates analytical model building. It is a
branch of artificial intelligence based on the
idea that systems can learn from data, identify
patterns and make decisions with minimal
human intervention.
• Types of machine learning
 Supervised learning
 Unsupervised learning
 Reinforcement learning
PROPOSED SOLUTION WITH ALGORITHMS

• Machine learning can easily identify the


malware in the data and datasets
• Different types of machine learning algorithms
are applied such as :
 DECISION TREE
 SVM
 Random forest
 XG boost
EXISTING SYSTEMS
• Malware detection by using window api sequence and
machine learning
• Detecting unknown malicious code by applying
classification techniques on oppose patterns
• Detecting scareware by mining variable length
instructions sequence
• Accurate adware detection using oppose sequence
extraction
• Detection of spyware by mining executable files
• Detection by using neural networks on the malware
CONCLUSION
• A Malware is critical threat to user computer system in
terms of stealing confidential information or disabling
security.
• This project present some of the existing machine
learning algorithms directly applied on the data or
datasets of malware
• It explains the how the algorithms will play a role in
detecting malware wit high accuracy and predictions
• We are also using data science and data mining
techniques to overcome the drawbacks of existing
system

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy