With the rapid development of the Internet, malware became one of the major cyber threats nowadays. Any software performing malicious actions, including information stealing, espionage, etc. can be referred to as malware. Kaspersky Labs (2017) define malware as “a type of program designed to infect a legitimate user's computer, mobile and inflict harm on it in multiple ways.” While the diversity of malware is increasing, anti-virus scanners cannot fulfill the needs of protection, resulting in millions of hosts being attacked. According to Kaspersky Labs (2016), 6 563 145 different hosts were attacked, and 4 000 000 unique malware objects were detected in 2015. In turn, Juniper Research (2016) predicts the cost of data breaches to increase to $2.1 trillion globally by 2019. In addition to that, there is a decrease in the skill level that is required for malware development, due to the high availability of attacking tools on the Internet nowadays. High availability of anti-detection techniques, as well as ability to buy malware on the black market result in the opportunity to become an attacker for anyone, not depending on the skill level. Current studies show that more and more attacks are being issued by script-kiddies or are automated. (Aliyev 2010). Therefore, malware protection of computer, mobile systems is one of the most important cybersecurity tasks for single users and businesses, since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, machine learning-based techniques can be used. This paper discusses the main points and concerns of machine learning-based malware detection, as well as looks for the best feature representation and classification methods. The goal of this project is to develop the proof of concept for the machine learning based malware classification based on Cuckoo Sandbox. This sandbox will be utilized for the extraction of the behavior of the malware samples, which will be used as an input to the machine learning algorithms. The goal is to 6 determine the best feature representation method and how the features should be extracted, the most accurate algorithm that can distinguish the malware families with the lowest error rate. The accuracy will be measured both for the case of detection of wheher the file is malicious and for the case of classification of the file to the malware family. The accuracy of the obtained results will also be assessed in relation to current scoring implemented in Cuckoo Sandbox, and the decision of which method performs better will be made. The study conducted will allow building an additional detection module to Cuckoo Sandbox.
검증 됨 0%
주의. 확인되지 않은 회원은 실제로 팀원이 아닌 위험이 있습니다.
이 쿠폰은 쿠폰 제공자가 제공 한 정보 및 기타 공개적으로 제공되는 정보를 기반으로합니다. 토큰 판매 또는 교환 이벤트는 ICO 보유자와 전적으로 관련이 없으며 ICOholder는 이에 관여하지 않습니다 (기술 지원 또는 프로모션 포함). ICOholder와 관계가없는 사람들로부터 나열된 토큰 판매는 고객이 전반적인 토큰 부문에서 발생하는 활동을 추적하는 데 도움이되는 경우에만 표시됩니다. 이 정보는 귀하가 의지해야 할 조언에 해당하지 않습니다. 당사 사이트의 내용을 기반으로 한 조치를 취하거나 삼 가기 전에 전문가 또는 전문가의 자문을 구하거나 자신의 실사를 수행해야합니다. 토큰 획득과 관련하여 참가자가 입력 한 조건은 토큰과 ICO 소유자의 발행인이 그러한 토큰의 판매자가 아닙니다. ICO 소유자는 토큰 판매와 관련하여 제 3 자의 진술에 대해 법적 책임이 없으며 계약 위반에 대한 청구는 여기에 열거 된 토큰 발행 기관과 직접 체결해야합니다.
이 토큰 판매 또는 관련 인물의 성격, 적법성 또는 합법성에 대해 우려되는 점이 있으면 info@icoholder.com 에 문의하십시오. 귀하의 우려 사항에 대한 자세한 정보를 제공하십시오.