SlideShare a Scribd company logo
1 of 14
GOVERNMENT ENGINEERING COLLEGE
HASSAN
Seminar topic on:
Malware Detection using Machine Learning
Under the Guidance of : Presented by:
Dr. T G Basavaraju BE,ME,PHD Savitha c
Head of Department CS&E 4GH19CS416
GEC Hassan
CONTENTS
1. Introduction
2. Types of Malware
3. Malware detection using Neural networks
4. Malware detection using Naïve Bayes
5. Approaches of malware detection
6. Methodology
7. Advantages
8. Applications
9. Conclusion
10. References
INTRODUCTION
 Malware, short for malicious software, is a sweeping term for
viruses, worms, trojans and other harmful software programs which
can either create harm to data or access some important data
illegally.
 There are various methods of arranging malware the first is by how
the malicious software spreads.
 A worm is an independent piece of malicious software that
duplicates itself and spreads from one PC to another.
Types Of Malware
There are 3 types of malwares :-
1. Ransomware
2. Spyware
3. Adware
• Ransomware :-
Ransomware is a kind of malware that scrambles your hard drives records
and requests an installment, ordinarily in Bitcoin, in returns for the decryption key. A
few prominent malware flare-ups of the most recent couple of years, like Petya, are
ransomware.
• Spyware :-
Spyware is characterized by Webroot Cybersecurity as “malware
utilized with the end goal of covertly assembling information on a clueless
client”.
• Adware :-
Adware is malware that powers your program to divert to web
commercials, which frequently try themselves to download further, more
malicious software.
Malware detection using Neural
networks
• Neural Networks are essentially a piece of deep learning, which thus is a subset of
machine learning .
• Neural networks are only an exceptionally currently progressed use of machine
learning that is currently discovering applications in numerous fields of interest.
• Neural networks are a class of machine learning algorithms which is used to
demonstrate complex patterns in datasets using different secret layers and non-
straight actuation functions.
• A neural networks is a series of algorithms that endeavors to perceive basic
relationships in a set of data through a process that mimics the manner in which
the human mind operates.
Malware Detection using Naive Bayes
• It is a classification technique dependent on Bayes' Theorem with a
suspicion of freedom among indicators.
• In straightforward terms, a Naïve Bayes classifier expects that the
presence of a specific element in a class is inconsequential to the
presence of some other feature.
• A naïve bayes classifier accepts that the presence of a specific element of
a class is disconnected to the presence of some other component, given
the class variable.
Approaches to Malware Detection
• An efficient, robust and scalable malware recognition module is the key
component of every cybersecurity product.
• Malware recognition modules decide if an object is a threat based on they
collected on it.
• This data may be collected at different phases:-
1. Pre-execution phase
2. Post-execution phase
• Pre-execution phase:-
Data is anything you can tell about a file without executing it. This may include
executable file format descriptions, code descriptions, binary data statistics, text strings and
information extracted via code emulation and other similar data.
• Post-execution phase:-
data conveys information about behavior or events caused by process activity in a
system. In the early part of the cyber era, the number of malware threats was relatively low,
and simple manually created pre-execution rules were often enough to detect threats.
METHODOLOGY
• There are three main methods used to malware detection:-
1. Signature based
2. Behavioral based
3. Heuristic based
 Signature based:-
As computer usage became more common, it became easier for attackers to
spread their malicious code. This method is called signature based detection.
ADVANTAGES
• It can detect known as well as new.
• Unknown instances of malware .
• It identifies vulnerabilities in a runtime environment.
• It focuses on the behavior of system to detect unknown attack.
APPLICATIONS
• Data mining techniques through have increased using machine learning to
recognize malicious files.
• Malware is a any type of malicious software designed to harm or exploit any
programmable device, service or network.
CONCLUSION
• Malware is a critical threat to users computer system in terms of stealing
confidential information, corrupting or disabling security system.
• According to their comparative study we are going to use advanced malware
detection technique i.e. data mining and machine learning method to overcome
the drawbacks of existing malware detection techniques .
• We explore the various different types of the modals which are used by various
researchers in the malware detection and highlight the accuracy of these models.
• As per the accuracy of the results we found that the malware detection based on
the neural networks are more effective and accurate as compared to the other
approaches.
REFERENCES
• Mohsen Kakavand Mohammad Dabbagh and Ali. Dehghantanha Application of Machine Learning Algorithms for
Android Malware Detection pp. 32-36 2018.
• M. Kalash M. Rochan N. Mohammed N. D. Bruce Y. Wang and F. Iqbal "Malware classification with deep
convolutional neural networks" 2018 9th IFIP International Conference on New technologies Mobility and
Security (NTMS) pp. 1-5 2018 February.
• A. Mujumdar G. Masiwal and D. B. Meshram "Analysis of signature-based and behavior-based anti-malware
approaches" International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
vol. 2 no. 6 2013.
• I. Burguera U. Zurutuza and S. Nadjm-Tehrani "Crowdroid: behavior-based malware detection system for
Android" Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices pp.
15-26 2011 October.
• D. Gavrilut M. Cimpoesu D. Anton and L. Ciortuz Malware Detection Using Machine Learning Proceedings of
the International Multiconference on Computer Science and InformationTechnology pp. 735-741 2009.

More Related Content

Similar to savi technical ppt.pptx

An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 

Similar to savi technical ppt.pptx (20)

A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
What Are The Types of Malware? Must Read
What Are The Types of Malware? Must ReadWhat Are The Types of Malware? Must Read
What Are The Types of Malware? Must Read
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODSA STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
Integrated Feature Extraction Approach Towards Detection of Polymorphic Malwa...
 
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
COMPARISON OF MALWARE CLASSIFICATION METHODS USING CONVOLUTIONAL NEURAL NETWO...
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptxSupervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
 
Hancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueHancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent technique
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 

savi technical ppt.pptx

  • 1. GOVERNMENT ENGINEERING COLLEGE HASSAN Seminar topic on: Malware Detection using Machine Learning Under the Guidance of : Presented by: Dr. T G Basavaraju BE,ME,PHD Savitha c Head of Department CS&E 4GH19CS416 GEC Hassan
  • 2. CONTENTS 1. Introduction 2. Types of Malware 3. Malware detection using Neural networks 4. Malware detection using Naïve Bayes 5. Approaches of malware detection 6. Methodology 7. Advantages 8. Applications 9. Conclusion 10. References
  • 3. INTRODUCTION  Malware, short for malicious software, is a sweeping term for viruses, worms, trojans and other harmful software programs which can either create harm to data or access some important data illegally.  There are various methods of arranging malware the first is by how the malicious software spreads.  A worm is an independent piece of malicious software that duplicates itself and spreads from one PC to another.
  • 4. Types Of Malware There are 3 types of malwares :- 1. Ransomware 2. Spyware 3. Adware • Ransomware :- Ransomware is a kind of malware that scrambles your hard drives records and requests an installment, ordinarily in Bitcoin, in returns for the decryption key. A few prominent malware flare-ups of the most recent couple of years, like Petya, are ransomware.
  • 5. • Spyware :- Spyware is characterized by Webroot Cybersecurity as “malware utilized with the end goal of covertly assembling information on a clueless client”. • Adware :- Adware is malware that powers your program to divert to web commercials, which frequently try themselves to download further, more malicious software.
  • 6. Malware detection using Neural networks • Neural Networks are essentially a piece of deep learning, which thus is a subset of machine learning . • Neural networks are only an exceptionally currently progressed use of machine learning that is currently discovering applications in numerous fields of interest. • Neural networks are a class of machine learning algorithms which is used to demonstrate complex patterns in datasets using different secret layers and non- straight actuation functions. • A neural networks is a series of algorithms that endeavors to perceive basic relationships in a set of data through a process that mimics the manner in which the human mind operates.
  • 7. Malware Detection using Naive Bayes • It is a classification technique dependent on Bayes' Theorem with a suspicion of freedom among indicators. • In straightforward terms, a Naïve Bayes classifier expects that the presence of a specific element in a class is inconsequential to the presence of some other feature. • A naïve bayes classifier accepts that the presence of a specific element of a class is disconnected to the presence of some other component, given the class variable.
  • 8. Approaches to Malware Detection • An efficient, robust and scalable malware recognition module is the key component of every cybersecurity product. • Malware recognition modules decide if an object is a threat based on they collected on it. • This data may be collected at different phases:- 1. Pre-execution phase 2. Post-execution phase
  • 9. • Pre-execution phase:- Data is anything you can tell about a file without executing it. This may include executable file format descriptions, code descriptions, binary data statistics, text strings and information extracted via code emulation and other similar data. • Post-execution phase:- data conveys information about behavior or events caused by process activity in a system. In the early part of the cyber era, the number of malware threats was relatively low, and simple manually created pre-execution rules were often enough to detect threats.
  • 10. METHODOLOGY • There are three main methods used to malware detection:- 1. Signature based 2. Behavioral based 3. Heuristic based  Signature based:- As computer usage became more common, it became easier for attackers to spread their malicious code. This method is called signature based detection.
  • 11. ADVANTAGES • It can detect known as well as new. • Unknown instances of malware . • It identifies vulnerabilities in a runtime environment. • It focuses on the behavior of system to detect unknown attack.
  • 12. APPLICATIONS • Data mining techniques through have increased using machine learning to recognize malicious files. • Malware is a any type of malicious software designed to harm or exploit any programmable device, service or network.
  • 13. CONCLUSION • Malware is a critical threat to users computer system in terms of stealing confidential information, corrupting or disabling security system. • According to their comparative study we are going to use advanced malware detection technique i.e. data mining and machine learning method to overcome the drawbacks of existing malware detection techniques . • We explore the various different types of the modals which are used by various researchers in the malware detection and highlight the accuracy of these models. • As per the accuracy of the results we found that the malware detection based on the neural networks are more effective and accurate as compared to the other approaches.
  • 14. REFERENCES • Mohsen Kakavand Mohammad Dabbagh and Ali. Dehghantanha Application of Machine Learning Algorithms for Android Malware Detection pp. 32-36 2018. • M. Kalash M. Rochan N. Mohammed N. D. Bruce Y. Wang and F. Iqbal "Malware classification with deep convolutional neural networks" 2018 9th IFIP International Conference on New technologies Mobility and Security (NTMS) pp. 1-5 2018 February. • A. Mujumdar G. Masiwal and D. B. Meshram "Analysis of signature-based and behavior-based anti-malware approaches" International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) vol. 2 no. 6 2013. • I. Burguera U. Zurutuza and S. Nadjm-Tehrani "Crowdroid: behavior-based malware detection system for Android" Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices pp. 15-26 2011 October. • D. Gavrilut M. Cimpoesu D. Anton and L. Ciortuz Malware Detection Using Machine Learning Proceedings of the International Multiconference on Computer Science and InformationTechnology pp. 735-741 2009.