SlideShare a Scribd company logo
Malware Detection Using Data Mining
Techniques
Guided by,
Prof. R.K. Chavan
Presented by,
Karwande Akash N.
PROBLEM DEFINITION
 One the most important and most serious problems is the internet
world is faced with existence of malwares.
 According to studies conducted in this field, we have concluded that
80 percent of damages to systems have been from malwares and only
20 percent of it has been from other factors.
 However, unfortunately, most of the works has been on the 20% and
the malwares have received less attention and thus we're facing many
security problems every day.
These attack are usually done to computer networks of sensitive agencies such as
security entities, banks, economic centers, information storage centers, computer
networks.
Types Of Malwares
Computer programs which have a destructive content and applied to systems from invader, are called
malware and the systems on which this program are applied is called victim system .
Malwares are classified into several kinds based on behavior or attack methods.
 Virus
 Worm
 Trojan Horse
 Logic Bomb
 Backdoors
 Rootkit
Rootkit
Rootkit is a malware that has the ability to hide itself and its activities
on the target system. Rootkits can hide themselves from users through
the following methods:
 Rootkit integrate its malicious codes with operating system codes which are at
low-levels
 Rootkit transfers its malicious codes into healthy processes and by doing so, it
can use the memory that and do its malicious programs.
Analysis to Detect Malware
Static Analysis
Software analysis without execution, is called static analysis which without
running the program, investigates the code and can detect malicious code and put it
in one of the available groups based on different learning methods .
In the static method, binary codes are checked and viruses are detected based on
different learning methods. In fact this is the key part of static method.
It is observed that extracting binary codes is a relatively complex work.
Dynamic Analysis
Program analyzing, while it is running, is called dynamic analysis which also
referred to as behaviors analyzing and include software running and watching its
behavior, system interaction and its effects on host system.
Dynamic analysis method need to run polluted files in a virtual environment like a
virtual machine, a simulator, sand box, etc to analyze it in virtual environment.
Checking recalled functions.
Following the flow of information.
Following the order of running functions.
But unfortunately this method is too slow as real time detectors on the end
host and often need virtual machine technology.
Malware Detection Techniques
Signature- Based Detection
The main goal of this method is to extract the unique bytes
sequence of codes as the signature. Searching for a signature in the
suspicious files is a part of the task .
Usage of encrypted model in cryptography has led to neutralize the
signature based method which makes these encrypted malwares
undetectable through this method.
In order to overcome these problems, the behavior based method is
used.
Behavior-Based Detection
 Behavioral parameters include many factors such as source or
destination of malware, kinds of attachments and other statistical
properties.
 Dynamic behaviors are directly used in evaluating the damage to the
system and also help us to detect and classify new malwares.
 Malware clustering based on dynamic analysis is based on running
the malware in a real controlled environment.
Analysis of Results
 The advantages of this method include its high success rate in
malwares detection because it is directly in contact with malware
binary codes.
 Above figure shows a graph of data mining operation results using
Weka tool on database. As shown above, the success rate of this
method in rootkit detection is more than 97% which is a remarkable
rate.
Advanced Malware Detection Techniques
N-Grams
API/System calls
n-Grams-based file signature for malware
detection
 Substrings of a larger string with a length n.
 For example, the string “MALWARE”, can be segmented into
several 4-grams: “MALW”, “ALWA”, “LWAR”, “WARE” and so on.
 On the top, N-grams is used for malware analysis by an IBM
research group in 1994. They proposed a method to automatically
extract signatures for the malware. Still, there was no experimental
results in their research.
 Once the set is chosen, we extract n-grams for every file in that set
that will act as the file signature.
 System can classify any unknown instance as malware or benign
software.
 (amount of malware instances) - (amount of benign instances)>=
parameter d, as shown in the following formula:
MW(K)−GW(K)>=d
K - nearest neighbors and d is the parameter d.
 Keep low value of false positive ratio; with a high value of d.
Malware Detection Using Data Mining Techniques
Thank You
Ad

Recommended

Network Forensics
Network Forensics
primeteacher32
 
Introduction to forensic imaging
Introduction to forensic imaging
Marco Alamanni
 
mobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Forensics of a Windows System
Forensics of a Windows System
Conferencias FIST
 
Autopsy Digital forensics tool
Autopsy Digital forensics tool
Sreekanth Narendran
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Linux forensics
Linux forensics
Santosh Khadsare
 
Incident response process
Incident response process
Bhupeshkumar Nanhe
 
Windows Hacking
Windows Hacking
Mayur Sutariya
 
Mobile Forensics
Mobile Forensics
primeteacher32
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Memory Forensics
Memory Forensics
n|u - The Open Security Community
 
Network forensic
Network forensic
Manjushree Mashal
 
Malware analysis
Malware analysis
Prakashchand Suthar
 
Digital forensic tools
Digital forensic tools
Parsons Corporation
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Malware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 
Mac Forensics
Mac Forensics
CTIN
 
Cyber threats
Cyber threats
kelsports
 
Collecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Malware forensic
Malware forensic
SumeraHangi
 
CS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Network Forensics Intro
Network Forensics Intro
Jake K.
 
Legal aspects of digital forensics
Legal aspects of digital forensics
KakshaPatel3
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Basic malware analysis
Basic malware analysis
securityxploded
 
Memory forensics
Memory forensics
Sunil Kumar
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
ManjuAppukuttan2
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
ijcsa
 

More Related Content

What's hot (20)

Windows Hacking
Windows Hacking
Mayur Sutariya
 
Mobile Forensics
Mobile Forensics
primeteacher32
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Memory Forensics
Memory Forensics
n|u - The Open Security Community
 
Network forensic
Network forensic
Manjushree Mashal
 
Malware analysis
Malware analysis
Prakashchand Suthar
 
Digital forensic tools
Digital forensic tools
Parsons Corporation
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Malware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 
Mac Forensics
Mac Forensics
CTIN
 
Cyber threats
Cyber threats
kelsports
 
Collecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Malware forensic
Malware forensic
SumeraHangi
 
CS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Network Forensics Intro
Network Forensics Intro
Jake K.
 
Legal aspects of digital forensics
Legal aspects of digital forensics
KakshaPatel3
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Basic malware analysis
Basic malware analysis
securityxploded
 
Memory forensics
Memory forensics
Sunil Kumar
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Malware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 
Mac Forensics
Mac Forensics
CTIN
 
Cyber threats
Cyber threats
kelsports
 
Collecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Malware forensic
Malware forensic
SumeraHangi
 
Network Forensics Intro
Network Forensics Intro
Jake K.
 
Legal aspects of digital forensics
Legal aspects of digital forensics
KakshaPatel3
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Memory forensics
Memory forensics
Sunil Kumar
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 

Similar to Malware Detection Using Data Mining Techniques (20)

CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
ManjuAppukuttan2
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
ijcsa
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
ManjuAppukuttan2
 
Cyber Security Threats Unveilded
Cyber Security Threats Unveilded
Elewayte
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
ijaia
 
Survey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
What Are The Types of Malware? Must Read
What Are The Types of Malware? Must Read
Bytecode Security
 
Malware detection
Malware detection
ssuser1eca7d
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
WajdiElhamzi3
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
Editor IJARCET
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
Editor IJARCET
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET Journal
 
Introduction to Malware analysis
Introduction to Malware analysis
HusseinMuhaisen
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
Alamgir Hossain
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
jaigera
 
Automated malware invariant generation
Automated malware invariant generation
UltraUploader
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing Environments
IJEACS
 
Introduction To Malware Analysis.pptx
Introduction To Malware Analysis.pptx
TrngTun36
 
Introduction To Malware Analysis.pptx
Introduction To Malware Analysis.pptx
datasun
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
ManjuAppukuttan2
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
ijcsa
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
ManjuAppukuttan2
 
Cyber Security Threats Unveilded
Cyber Security Threats Unveilded
Elewayte
 
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
ijaia
 
Survey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
What Are The Types of Malware? Must Read
What Are The Types of Malware? Must Read
Bytecode Security
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
WajdiElhamzi3
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
Editor IJARCET
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
Editor IJARCET
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET Journal
 
Introduction to Malware analysis
Introduction to Malware analysis
HusseinMuhaisen
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
Alamgir Hossain
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
jaigera
 
Automated malware invariant generation
Automated malware invariant generation
UltraUploader
 
Features for Detecting Malware on Computing Environments
Features for Detecting Malware on Computing Environments
IJEACS
 
Introduction To Malware Analysis.pptx
Introduction To Malware Analysis.pptx
TrngTun36
 
Introduction To Malware Analysis.pptx
Introduction To Malware Analysis.pptx
datasun
 
Ad

Recently uploaded (20)

Slides: Eco Economic Epochs for The World Game (s) pdf
Slides: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
 
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
 
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
 
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
taqyed
 
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
 
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
 
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
 
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
taqyed
 
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
 
Transmission Control Protocol (TCP) and Starlink
Transmission Control Protocol (TCP) and Starlink
APNIC
 
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
 
Make DDoS expensive for the threat actors
Make DDoS expensive for the threat actors
APNIC
 
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
Taqyea
 
Global Networking Trends, presented at the India ISP Conclave 2025
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
 
BitRecover OST to PST Converter Software
BitRecover OST to PST Converter Software
antoniogosling01
 
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
 
BroadLink Cloud Service introduction.pdf
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
 
history of internet in nepal Class-8 (sparsha).pptx
history of internet in nepal Class-8 (sparsha).pptx
SPARSH508080
 
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
 
DDoS in India, presented at INNOG 8 by Dave Phelan
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
 
Slides: Eco Economic Epochs for The World Game (s) pdf
Slides: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
 
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
 
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
 
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
原版澳洲斯文本科技大学毕业证(SUT毕业证书)如何办理
taqyed
 
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
 
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
B M Mostofa Kamal Al-Azad [Document & Localization Expert]
Mostofa Kamal Al-Azad
 
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
 
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
taqyed
 
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
 
Transmission Control Protocol (TCP) and Starlink
Transmission Control Protocol (TCP) and Starlink
APNIC
 
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
 
Make DDoS expensive for the threat actors
Make DDoS expensive for the threat actors
APNIC
 
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
Taqyea
 
Global Networking Trends, presented at the India ISP Conclave 2025
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
 
BitRecover OST to PST Converter Software
BitRecover OST to PST Converter Software
antoniogosling01
 
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
 
BroadLink Cloud Service introduction.pdf
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
 
history of internet in nepal Class-8 (sparsha).pptx
history of internet in nepal Class-8 (sparsha).pptx
SPARSH508080
 
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
 
DDoS in India, presented at INNOG 8 by Dave Phelan
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
 
Ad

Malware Detection Using Data Mining Techniques

  • 1. Malware Detection Using Data Mining Techniques Guided by, Prof. R.K. Chavan Presented by, Karwande Akash N.
  • 2. PROBLEM DEFINITION  One the most important and most serious problems is the internet world is faced with existence of malwares.  According to studies conducted in this field, we have concluded that 80 percent of damages to systems have been from malwares and only 20 percent of it has been from other factors.  However, unfortunately, most of the works has been on the 20% and the malwares have received less attention and thus we're facing many security problems every day.
  • 3. These attack are usually done to computer networks of sensitive agencies such as security entities, banks, economic centers, information storage centers, computer networks.
  • 4. Types Of Malwares Computer programs which have a destructive content and applied to systems from invader, are called malware and the systems on which this program are applied is called victim system . Malwares are classified into several kinds based on behavior or attack methods.  Virus  Worm  Trojan Horse  Logic Bomb  Backdoors  Rootkit
  • 5. Rootkit Rootkit is a malware that has the ability to hide itself and its activities on the target system. Rootkits can hide themselves from users through the following methods:  Rootkit integrate its malicious codes with operating system codes which are at low-levels  Rootkit transfers its malicious codes into healthy processes and by doing so, it can use the memory that and do its malicious programs.
  • 6. Analysis to Detect Malware Static Analysis Software analysis without execution, is called static analysis which without running the program, investigates the code and can detect malicious code and put it in one of the available groups based on different learning methods . In the static method, binary codes are checked and viruses are detected based on different learning methods. In fact this is the key part of static method. It is observed that extracting binary codes is a relatively complex work.
  • 7. Dynamic Analysis Program analyzing, while it is running, is called dynamic analysis which also referred to as behaviors analyzing and include software running and watching its behavior, system interaction and its effects on host system. Dynamic analysis method need to run polluted files in a virtual environment like a virtual machine, a simulator, sand box, etc to analyze it in virtual environment. Checking recalled functions. Following the flow of information. Following the order of running functions. But unfortunately this method is too slow as real time detectors on the end host and often need virtual machine technology.
  • 8. Malware Detection Techniques Signature- Based Detection The main goal of this method is to extract the unique bytes sequence of codes as the signature. Searching for a signature in the suspicious files is a part of the task . Usage of encrypted model in cryptography has led to neutralize the signature based method which makes these encrypted malwares undetectable through this method. In order to overcome these problems, the behavior based method is used.
  • 9. Behavior-Based Detection  Behavioral parameters include many factors such as source or destination of malware, kinds of attachments and other statistical properties.  Dynamic behaviors are directly used in evaluating the damage to the system and also help us to detect and classify new malwares.  Malware clustering based on dynamic analysis is based on running the malware in a real controlled environment.
  • 11.  The advantages of this method include its high success rate in malwares detection because it is directly in contact with malware binary codes.  Above figure shows a graph of data mining operation results using Weka tool on database. As shown above, the success rate of this method in rootkit detection is more than 97% which is a remarkable rate.
  • 12. Advanced Malware Detection Techniques N-Grams API/System calls
  • 13. n-Grams-based file signature for malware detection  Substrings of a larger string with a length n.  For example, the string “MALWARE”, can be segmented into several 4-grams: “MALW”, “ALWA”, “LWAR”, “WARE” and so on.  On the top, N-grams is used for malware analysis by an IBM research group in 1994. They proposed a method to automatically extract signatures for the malware. Still, there was no experimental results in their research.
  • 14.  Once the set is chosen, we extract n-grams for every file in that set that will act as the file signature.  System can classify any unknown instance as malware or benign software.  (amount of malware instances) - (amount of benign instances)>= parameter d, as shown in the following formula: MW(K)−GW(K)>=d K - nearest neighbors and d is the parameter d.  Keep low value of false positive ratio; with a high value of d.