Browse > Article
http://dx.doi.org/10.9717/kmms.2019.22.2.203

An Optimal Feature Selection Method to Detect Malwares in Real Time Using Machine Learning  

Joo, Jin-Gul (Dept. of Civil Eng., School of Engineering, Dongshin University)
Jeong, In-Seon (School of Electronics and Computer Eng., Chonnam National University)
Kang, Seung-Ho (Dept. of Information Security, College of Energy Convergence, Dongshin University)
Publication Information
Abstract
The performance of an intelligent classifier for detecting malwares added to multimedia contents based on machine learning is highly dependent on the properties of feature set. Especially, in order to determine the malicious code in real time the size of feature set should be as short as possible without reducing the accuracy. In this paper, we introduce an optimal feature selection method to satisfy both high detection rate and the minimum length of feature set against the feature set provided by PEFeatureExtractor well known as a feature extraction tool. For the evaluation of the proposed method, we perform the experiments using Windows Portable Executables 32bits.
Keywords
Malware; Machine Learning; PEFeatureExtractor; Feature Selection; Real Time Detection; Intelligent Classifier;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 C.T. Lin, N.J. Wang, H. Xiao, and C. Eckert, “Feature Selection and Extraction for Malware Classification,” Journal of Information Science and Engineering, Vol. 31, No. 3, pp. 965-992, 2015.
2 G. Chandrashekar and F. Sahin, “A Survey on Feature Selection Methods,” Computers and Electrical Engineering, Vol. 40, No. 1, pp. 16-28, 2014.   DOI
3 youarespecial, https://github.com/endgameinc/youarespecial, (accessed Jan., 10, 2019).
4 C. Chio and D. Freeman, Machine Learning and Security, O'Reilly Media, Sebastpol, 2018.
5 T.H. Kim and S.H. Kang, “An Intrusion Detection System Based on the Artificial Neural Network for Real Time Detection,” Journal of Information and Security, Vol. 17, No. 1, pp. 31-38, 2017.
6 M.H. Nguyen, D.L. Nguyen, X.M. Nguyen, and T.T. Quan, "Auto-Detection of Sophisticated Malware Using Lazy-Binding Control Flow Graph and Deep Learning," Computers and Security Vol. 76, pp.128-155, 2018.   DOI
7 Wikipedia, https://en.wikipedia.org/wiki/Malware, (accessed Jan., 10, 2019).
8 C.S. Park, “An Email Vaccine Cloud System for Detecting Malcode-Bearing Documents,” Journal of Korea Multimedia Society, Vol. 13, No. 5, pp. 754-762, 2010.
9 Y. Elovici, A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer, "Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic," Proceeding of the IEEE Symposium on Annual Conference on Artificial Intelligence, pp. 44-50, 2007.
10 C.I. Rene and J. Abdullah, “Malicious Code Intrusion Detection Using Machine Learning And Indicators of Compromise,” International Journal of Computer Science and Information Security, Vol. 15, No. 9, pp. 160-171, 2017.
11 P. Singhal and N. Raul, “Malware Detection Module Using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks,” International Journal of Network Security and Its Applications, Vol. 4, No. 1, pp. 61-67, 2012.   DOI