ADVANCED MALICIOUS SOFTWARE DETECTION USING DNN

Sulartopo Sulartopo, Dani Sasmoko, Zaenal Mustofa, Arsito Ari Kuncoro
{"title":"ADVANCED MALICIOUS SOFTWARE DETECTION USING DNN","authors":"Sulartopo Sulartopo, Dani Sasmoko, Zaenal Mustofa, Arsito Ari Kuncoro","doi":"10.51903/jtie.v1i1.144","DOIUrl":null,"url":null,"abstract":"The special component of malicious software analysis is advanced malicious software analysis which implicates interested the main framework of malicious software that can be executed after executing it and aggressive malicious software investigation depend on inquisitive of the practice of malicious software after running it in a composed habitat. Advanced malicious software analysis is usually performed by contemporary anti-malicious software operating systems using signature-based analysis. \nThe purpose of this research is to propose also decide a DNN for the progressive identification of portable files to study the features of portable executable malicious software to minimize the occurrence of distorted likeness when aware of advanced malicious software. The model proposed in this study is a NN with a Dropout model contrary to a resolution tree model to examine how well it performs in detecting real malicious PE files. Setup-skeptic methods are used to extract features from files. The dataset is used to train the proposed approach and measure outcomes by alternative common malicious software datasets. \nThe results from this study illustrate that the use of simple DNNs to study PE vector elements is not only efficient but more fewer system comprehensive than the traditional interested disclosure approach. The model proposed in this study achieves an A-UC of ninety-nine point eight with ninety accurate specifics at one percent inaccurate specific on the R-OC curve. For shows that this model has the potential to complement or replace conventional anti-malicious software operating systems so for future research, it is proposed to implement this model practically.","PeriodicalId":177576,"journal":{"name":"Journal of Technology Informatics and Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Technology Informatics and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51903/jtie.v1i1.144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The special component of malicious software analysis is advanced malicious software analysis which implicates interested the main framework of malicious software that can be executed after executing it and aggressive malicious software investigation depend on inquisitive of the practice of malicious software after running it in a composed habitat. Advanced malicious software analysis is usually performed by contemporary anti-malicious software operating systems using signature-based analysis. The purpose of this research is to propose also decide a DNN for the progressive identification of portable files to study the features of portable executable malicious software to minimize the occurrence of distorted likeness when aware of advanced malicious software. The model proposed in this study is a NN with a Dropout model contrary to a resolution tree model to examine how well it performs in detecting real malicious PE files. Setup-skeptic methods are used to extract features from files. The dataset is used to train the proposed approach and measure outcomes by alternative common malicious software datasets. The results from this study illustrate that the use of simple DNNs to study PE vector elements is not only efficient but more fewer system comprehensive than the traditional interested disclosure approach. The model proposed in this study achieves an A-UC of ninety-nine point eight with ninety accurate specifics at one percent inaccurate specific on the R-OC curve. For shows that this model has the potential to complement or replace conventional anti-malicious software operating systems so for future research, it is proposed to implement this model practically.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用深度神经网络进行高级恶意软件检测
恶意软件分析的特殊组成部分是高级恶意软件分析,它指的是对恶意软件执行后可执行的主要框架感兴趣,以及对恶意软件在组成的栖息地中运行后对其行为的探究式调查。高级恶意软件分析通常由当代反恶意软件操作系统使用基于签名的分析来完成。本研究的目的是提出并确定一种可移植文件递进识别的深度神经网络,研究可移植可执行恶意软件的特征,以最大限度地减少在意识到高级恶意软件时失真相似的发生。本研究中提出的模型是一个带有Dropout模型的神经网络,与分辨率树模型相反,以检查它在检测真实恶意PE文件方面的表现如何。安装怀疑方法用于从文件中提取特征。该数据集用于训练所提出的方法,并通过替代常见恶意软件数据集度量结果。本研究的结果表明,使用简单的深度神经网络研究PE向量元素不仅效率高,而且比传统的兴趣披露方法的系统综合性更差。本研究提出的模型在R-OC曲线上实现了99.8的A-UC,具有90个准确的特异性和1%的不准确特异性。为了表明该模型具有补充或取代传统反恶意软件操作系统的潜力,因此为了今后的研究,建议将该模型实际实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Nutritional Status Classification Of Stunting In Toddlers Using Naive Bayes Classifier Method CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM THREAT ATTRIBUTES HANGING IN THE WILD ANDROID REDUCING THE SHOOTING OF HYBRID PHOTOVOLTAIC PLANTS ON SCR AND LI-GRIDS VIRTUAL SYNCHRONOUS GENERATOR-BASED OVERSIGHT AND PREDICTIVE MODELS FOR MARS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1