SlideShare a Scribd company logo
1 of 15
Government Women Engineering College, Ajmer
(Bikaner Technical University, Bikaner)
Presentation
on
Malware Detection By Machine Learning
Submitted to: Submitted by:
Mr. Sudarshan Maurya Alisha Patidar
Assistant Professor B.tech VII Sem (CSE-A)
(Dept. of CSE) BTU Roll No.- 20EEMCS005
CONTENTS
 MALWARE
 Malware Detection
 Malware Attacks and How to Prevent Them
 Malware Symptoms
 Machine learning
 Proposed solutions with algorithms
 Existing Systems for malware detection using machine learning techniques
 Problem identified
 Conclusion
 References
MALWARE
 Malware is any software intentionally designed to cause damage to a computer, server,
client, or computer network. A wide variety of malware types exist, including computer
viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper
and scareware.
 Types of malware : Trojan horse, Virus, Adware, bots, bugs, rootkits, spyware
 MALWARE DETECTOR :
Malware detection is the process of scanning the computer and files to detect
malware. It is effective at detecting malware because it involves multiple tools and
approaches. It's not a one way process, it's actually quite complex.
Malware Detection
 Malware detection is the process of scanning the computer and files to detect
malware. It is effective at detecting malware because it involves multiple tools
and approaches. It's not a one way process, it's actually quite complex.
 Malware Detection Methods :
 1. Viruses
• Viruses require human intervention to propagate.
• Once users download the malicious code onto their devices -- often delivered via malicious
advertisements or phishing emails the virus spreads throughout their systems.
• Viruses can modify computer functions and applications; copy, delete and exfiltrate data.
 2. Adware:
• It is capable of downloading or displaying advertisements to the device user.
• Not steel any data from the system but it forcing users to see ads.
• Some Irritating forms of adware display browser pop-ups that cannot be closed.
 3. Ransomware
• Ransomware locks or encrypts files or devices and forces victims to pay a ransom in exchange
for reentry. While ransomware and malware are often used synonymously, ransomware is a
specific form of malware.
• Types of Ransomware : Locker ransomware, Crypto ransomware, Triple extortion
ransomware,
Malware Attacks and How to Prevent Them
 4. Rootkits
• A rootkits is malicious software that enables threat actors to remotely access
and control a device.
• Rootkits facilitate the spread of other types of malware, including ransomware,
viruses and keyloggers.
• Rootkits often go undetected, because once inside a device, they can
deactivate antimalware and antivirus software.
• Rootkits typically enter devices and systems through phishing emails and
malicious attachments.
 5. Spyware
• Spyware is malware that downloads onto a device without the user's
knowledge.
• It steals users’ data to sell to advertisers and external users.
• Spyware can track credentials and obtain bank details and other sensitive data.
• It infects devices through malicious apps, links, websites and email
attachments.
How to prevent malware attacks
 Strong Cyber hygiene is the best defense against malware attacks. The premise of
cyber hygiene is similar to that of personal hygiene: If an organization maintains a high
level of health (security), it avoids getting sick (attacked).
 Cyber hygiene practices that prevent malware attacks include the following:
• Follow email security best practices.
• Deploy email security gateways.
• Avoid clicking links and downloading attachments.
• Implement strong access control.
• Require multifactor authentication.
• Use the principle of least privilege.
• Adopt a zero-trust security strategy.
• Monitor for abnormal or suspicious activity.
Malware Symptoms
 computers, they all can produce similar symptoms. Computers that are
infected
with malware can exhibit any of the following symptoms:
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop icons
• Programs running, turning off, or reconfiguring themselves (malware will
often reconfigure or turn off antivirus and firewall programs)
• Strange computer behavior
• Emails/messages being sent automatically and without user's knowledge (a
friend receives a strange email from you that you did not send)
MACHINE LEARNING
 Machine learning is a method of data analysis that automates analytical model
building. It is a branch of artificial intelligence based on the idea that systems
can learn from data, identify patterns and make decisions with minimal human
intervention.
 Types of machine learning
 Supervised learning
 Unsupervised learning
 Reinforcement learning
PROPOSED SOLUTION WITH ALGORITHMS
 Machine learning can easily identify the malware in the data and datasets
 Different types of machine learning algorithms are applied such as :
 DECISION TREE
 SVM
 Random forest
 XG boost
Existing Systems for malware detection using
machine learning techniques
• Implement Machine Learning Pipeline: Leverage a machine learning pipeline for
malware detection, as illustrated in the provided figure, to enhance the system's
capabilities.
• Utilize Advanced Algorithms: Apply advanced machine learning algorithms to
analyze large volumes of data effectively, enhancing malware detection accuracy.
• Incorporate Dynamic Malware Detection: Focus on dynamic malware detection to
adapt to evolving threats, considering the progressive changes in malware behavior.
• Explore Automated System-Level Detection: Investigate automated system-level
malware detection, exploring fundamentals and the current status quo in machine
learning-based detection systems.
• Consider Proposed Techniques: Evaluate proposed methods, like the one
demonstrating effectiveness in Android devices for automated malware detection.
• Regularly Update Models: Keep machine learning models updated to stay resilient
against emerging malware threats.
EXISTING SYSTEMS
 Malware detection by using window api sequence and machine learning
 Detecting unknown malicious code by applying classification techniques on
oppose patterns
 Detecting scareware by mining variable length instructions sequence
 Accurate adware detection using oppose sequence extraction
 Detection of spyware by mining executable files
 Detection by using neural networks on the malware
CONCLUSION
 A Malware is critical threat to user computer system in terms of stealing
confidential information or disabling security.
 This project present some of the existing machine learning algorithms directly
applied on the data or datasets of malware
 It explains the how the algorithms will play a role in detecting malware wit
high accuracy and predictions
 We are also using data science and data mining techniques to overcome the
drawbacks of existing system
REFERENCES
 https://en.wikipedia.org/wiki/Malware
 https://en.wikipedia.org/wiki/Machine_learning
 https://en.wikipedia.org/wiki/Supervised_learning
 https://en.wikipedia.org/wiki/Spamming
 https://www.researchgate.net/publication/343499527_Project_report_Malwa
re_analysis
 https://towardsdatascience.com/malware-detection-using-deep-learning-
6c95dd235432
Thank You

More Related Content

Similar to Malware Detection By Machine Learning Presentation.pptx

Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfAlefya1
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Presentation.pptx..................................
Presentation.pptx..................................Presentation.pptx..................................
Presentation.pptx..................................Shivakrishnan18
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Systweak Software
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 

Similar to Malware Detection By Machine Learning Presentation.pptx (20)

Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
Presentation.pptx..................................
Presentation.pptx..................................Presentation.pptx..................................
Presentation.pptx..................................
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 

Recently uploaded

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Malware Detection By Machine Learning Presentation.pptx

  • 1. Government Women Engineering College, Ajmer (Bikaner Technical University, Bikaner) Presentation on Malware Detection By Machine Learning Submitted to: Submitted by: Mr. Sudarshan Maurya Alisha Patidar Assistant Professor B.tech VII Sem (CSE-A) (Dept. of CSE) BTU Roll No.- 20EEMCS005
  • 2. CONTENTS  MALWARE  Malware Detection  Malware Attacks and How to Prevent Them  Malware Symptoms  Machine learning  Proposed solutions with algorithms  Existing Systems for malware detection using machine learning techniques  Problem identified  Conclusion  References
  • 3. MALWARE  Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.  Types of malware : Trojan horse, Virus, Adware, bots, bugs, rootkits, spyware  MALWARE DETECTOR : Malware detection is the process of scanning the computer and files to detect malware. It is effective at detecting malware because it involves multiple tools and approaches. It's not a one way process, it's actually quite complex.
  • 4. Malware Detection  Malware detection is the process of scanning the computer and files to detect malware. It is effective at detecting malware because it involves multiple tools and approaches. It's not a one way process, it's actually quite complex.  Malware Detection Methods :
  • 5.  1. Viruses • Viruses require human intervention to propagate. • Once users download the malicious code onto their devices -- often delivered via malicious advertisements or phishing emails the virus spreads throughout their systems. • Viruses can modify computer functions and applications; copy, delete and exfiltrate data.  2. Adware: • It is capable of downloading or displaying advertisements to the device user. • Not steel any data from the system but it forcing users to see ads. • Some Irritating forms of adware display browser pop-ups that cannot be closed.  3. Ransomware • Ransomware locks or encrypts files or devices and forces victims to pay a ransom in exchange for reentry. While ransomware and malware are often used synonymously, ransomware is a specific form of malware. • Types of Ransomware : Locker ransomware, Crypto ransomware, Triple extortion ransomware, Malware Attacks and How to Prevent Them
  • 6.  4. Rootkits • A rootkits is malicious software that enables threat actors to remotely access and control a device. • Rootkits facilitate the spread of other types of malware, including ransomware, viruses and keyloggers. • Rootkits often go undetected, because once inside a device, they can deactivate antimalware and antivirus software. • Rootkits typically enter devices and systems through phishing emails and malicious attachments.  5. Spyware • Spyware is malware that downloads onto a device without the user's knowledge. • It steals users’ data to sell to advertisers and external users. • Spyware can track credentials and obtain bank details and other sensitive data. • It infects devices through malicious apps, links, websites and email attachments.
  • 7. How to prevent malware attacks  Strong Cyber hygiene is the best defense against malware attacks. The premise of cyber hygiene is similar to that of personal hygiene: If an organization maintains a high level of health (security), it avoids getting sick (attacked).  Cyber hygiene practices that prevent malware attacks include the following: • Follow email security best practices. • Deploy email security gateways. • Avoid clicking links and downloading attachments. • Implement strong access control. • Require multifactor authentication. • Use the principle of least privilege. • Adopt a zero-trust security strategy. • Monitor for abnormal or suspicious activity.
  • 8. Malware Symptoms  computers, they all can produce similar symptoms. Computers that are infected with malware can exhibit any of the following symptoms: • Increased CPU usage • Slow computer or web browser speeds • Problems connecting to networks • Freezing or crashing • Modified or deleted files • Appearance of strange files, programs, or desktop icons • Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs) • Strange computer behavior • Emails/messages being sent automatically and without user's knowledge (a friend receives a strange email from you that you did not send)
  • 9. MACHINE LEARNING  Machine learning is a method of data analysis that automates analytical model building. It is a branch of artificial intelligence based on the idea that systems can learn from data, identify patterns and make decisions with minimal human intervention.  Types of machine learning  Supervised learning  Unsupervised learning  Reinforcement learning
  • 10. PROPOSED SOLUTION WITH ALGORITHMS  Machine learning can easily identify the malware in the data and datasets  Different types of machine learning algorithms are applied such as :  DECISION TREE  SVM  Random forest  XG boost
  • 11. Existing Systems for malware detection using machine learning techniques • Implement Machine Learning Pipeline: Leverage a machine learning pipeline for malware detection, as illustrated in the provided figure, to enhance the system's capabilities. • Utilize Advanced Algorithms: Apply advanced machine learning algorithms to analyze large volumes of data effectively, enhancing malware detection accuracy. • Incorporate Dynamic Malware Detection: Focus on dynamic malware detection to adapt to evolving threats, considering the progressive changes in malware behavior. • Explore Automated System-Level Detection: Investigate automated system-level malware detection, exploring fundamentals and the current status quo in machine learning-based detection systems. • Consider Proposed Techniques: Evaluate proposed methods, like the one demonstrating effectiveness in Android devices for automated malware detection. • Regularly Update Models: Keep machine learning models updated to stay resilient against emerging malware threats.
  • 12. EXISTING SYSTEMS  Malware detection by using window api sequence and machine learning  Detecting unknown malicious code by applying classification techniques on oppose patterns  Detecting scareware by mining variable length instructions sequence  Accurate adware detection using oppose sequence extraction  Detection of spyware by mining executable files  Detection by using neural networks on the malware
  • 13. CONCLUSION  A Malware is critical threat to user computer system in terms of stealing confidential information or disabling security.  This project present some of the existing machine learning algorithms directly applied on the data or datasets of malware  It explains the how the algorithms will play a role in detecting malware wit high accuracy and predictions  We are also using data science and data mining techniques to overcome the drawbacks of existing system
  • 14. REFERENCES  https://en.wikipedia.org/wiki/Malware  https://en.wikipedia.org/wiki/Machine_learning  https://en.wikipedia.org/wiki/Supervised_learning  https://en.wikipedia.org/wiki/Spamming  https://www.researchgate.net/publication/343499527_Project_report_Malwa re_analysis  https://towardsdatascience.com/malware-detection-using-deep-learning- 6c95dd235432