With the rapid development of the Internet, malware became one of the major cyber threats nowadays. Any software performing malicious actions, including information stealing, espionage, etc. can be referred to as malware. Kaspersky Labs (2017) define malware as “a type of program designed to infect a legitimate user's computer, mobile and inflict harm on it in multiple ways.” While the diversity of malware is increasing, anti-virus scanners cannot fulfill the needs of protection, resulting in millions of hosts being attacked. According to Kaspersky Labs (2016), 6 563 145 different hosts were attacked, and 4 000 000 unique malware objects were detected in 2015. In turn, Juniper Research (2016) predicts the cost of data breaches to increase to $2.1 trillion globally by 2019. In addition to that, there is a decrease in the skill level that is required for malware development, due to the high availability of attacking tools on the Internet nowadays. High availability of anti-detection techniques, as well as ability to buy malware on the black market result in the opportunity to become an attacker for anyone, not depending on the skill level. Current studies show that more and more attacks are being issued by script-kiddies or are automated. (Aliyev 2010). Therefore, malware protection of computer, mobile systems is one of the most important cybersecurity tasks for single users and businesses, since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, machine learning-based techniques can be used. This paper discusses the main points and concerns of machine learning-based malware detection, as well as looks for the best feature representation and classification methods. The goal of this project is to develop the proof of concept for the machine learning based malware classification based on Cuckoo Sandbox. This sandbox will be utilized for the extraction of the behavior of the malware samples, which will be used as an input to the machine learning algorithms. The goal is to 6 determine the best feature representation method and how the features should be extracted, the most accurate algorithm that can distinguish the malware families with the lowest error rate. The accuracy will be measured both for the case of detection of wheher the file is malicious and for the case of classification of the file to the malware family. The accuracy of the obtained results will also be assessed in relation to current scoring implemented in Cuckoo Sandbox, and the decision of which method performs better will be made. The study conducted will allow building an additional detection module to Cuckoo Sandbox.
验证 0%
注意。未经证实的成员实际上可能不是团队成员
此优惠仅基于要约人提供的信息及其他公开信息。令牌销售或交换活动与ICO持有人完全无关,ICO持有人不参与(包括任何技术支持或促销)。仅显示ICO持有人无关的人员列出的令牌销售仅用于帮助客户跟踪总体令牌部门内发生的活动。这些信息并不意味着相当于您应该依赖的建议。在采取或不采取任何行动之前,您必须获得专业或专家的建议或进行自己的尽职调查。贡献者就收购令牌所订立的任何条款及条件属于其之间,而令牌及ICO持有人的发行人并非该等令牌的卖方。对于任何代币销售而言,ICOholder对第三方所作的任何陈述不承担任何法律责任,并且还必须直接针对此处列出的代币发行实体提出任何违反合同的请求。
如果您有任何疑问关于此令牌销售的性质,合法性或合法性或相关人员,请联系info@icoholder.com,了解有关您的疑虑的详细信息。