首页> 外文期刊>IOSR journal of computer engineering >Comparative and Analysis Study for Malicious Executable by Using Various Classification Algorithms
【24h】

Comparative and Analysis Study for Malicious Executable by Using Various Classification Algorithms

机译:使用各种分类算法进行恶意可执行的比较和分析研究

获取原文
获取原文并翻译 | 示例
           

摘要

There are a lot of applications regarding the data mining methods in detecting malwares. One of the most widely utilized data mining methods is the Classification method. In our research, we are presenting a data mining classification procedure through applying machine learning algorithms to detect malicious executable files, and this study will investigate the approach of classification in some algorithms such as (Support Vector Machine. Random Forest. KNN (k-Nearest Neighbors Classifier), and The Hoeffding Tree). In our classification process, we used some of well-known machine-learning algorithms by WEKA libraries, and then we train our dataset to detect malware. We made a comparative analysis between algorithms used and how they deal with the selected features based on the size of the data, to illustrate the performance efficiency Where we go t a high accuracy up to 98% with Random Forest. Moreover, this study is considered as a base for future studies regarding malware analysis through machine learning algorithms.
机译:有很多关于检测恶魔术中的数据挖掘方法的应用程序。最广泛利用的数据挖掘方法之一是分类方法。在我们的研究中,我们正在通过应用机器学习算法来介绍数据挖掘分类程序来检测恶意可执行文件,并且本研究将研究一些算法中的分类方法(支持向量机。随机森林。KNN(K离最近的邻居分类器)和hoeffding树)。在我们的分类过程中,我们使用Weka库的一些知名机器学习算法,然后我们培训我们的数据集来检测恶意软件。我们在使用的算法和它们如何根据数据的大小处理所选特征之间的比较分析,以说明随机森林高达98%的高精度高达98%的性能效率。此外,该研究被认为是通过机器学习算法的对恶意软件分析的未来研究的基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号