Malicious Application Detection in Windows Using SVM Algorithm

[{“box”:0,”content”:”

n

Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 30-36

n

n

n

n

n

n

By

n

[foreach 286]

Manish Kapoor, Manish Kapoor, Suraj Sawant, Aishwarya Joshi, Neha Tawade
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, R.M. Samant, Student, Student, Student,Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Head of Department, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune,Maharashtra, Maharashtra, Maharashtra, Maharashtra, Maharashtra,India, India, India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n In recent years, both the development of Windows application clients and the uses of smart mobile phones have increased significantly. As the number of Windows application users continues to grow, there is a rise in malicious individuals who develop harmful Windows applications with the intent of unlawfully obtaining confidential information and engaging in fraudulent activities. These applications are designed to target vulnerable areas such as mobile banking and digital wallets, aiming to deceive users and misuse their sensitive data. There are so many malicious software, tools, and programmers that are available. However, it is essential to establish a system that is capable and effective for identifying and thwarting freshly developed dangerous programmes written by hackers or programmers. This system should be able to recognise and react to sophisticated threats in an efficient manner. The purpose of this study is to identify fraudulent Windows apps using machine learning techniques.n

    n

    n

    n

    Keywords: Malicious Application Detection in Windows Using SVM Algorithm

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Manish Kapoor, Manish Kapoor, Suraj Sawant, Aishwarya Joshi, Neha Tawade Malicious Application Detection in Windows Using SVM Algorithm ijmct July 20, 2023; 01:30-36

    n

    How to cite this URL: Manish Kapoor, Manish Kapoor, Suraj Sawant, Aishwarya Joshi, Neha Tawade Malicious Application Detection in Windows Using SVM Algorithm ijmct July 20, 2023n {cited July 20, 2023};01:30-36. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Karbab EB, Debbabi M, Derhab A, Mouheb D. MalDozer: Automatic framework for android malware detection using deep learning. Digit Investig. 2018 Mar 1; 24: S48–59.
    2. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 IEEE 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
    3. Canfora G, Medvet E, Mercaldo F, Visaggio CA. Detecting android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile. 2015 Aug 31; 13–20.
    4. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN. Taintdroid: an information-flow tracking system for real time privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS). 2014 Jun 1; 32(2): 1–29.
    5. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
    6. Ni Z, Yang M, Ling Z, Wu JN, Luo J. Real-time detection of malicious behavior in android apps. In 2016 IEEE International Conference on Advanced Cloud and Big Data (CBD). 2016 Aug 13; 221–227.
    7. Feldman S, Stadther D, Wang B. Manilyzer: automated android malware detection through manifest analysis. In 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems. 2014 Oct 28; 767–772.
    8. Tian P, Huang X. A malicious application detection model to remove the influence of interference API sequence. In 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017 Nov 24; 501–505.
    9. Chen F, Fu Y. Dynamic detection of unknown malicious executables base on API interception. In 2009 IEEE 1st International Workshop on Database Technology and Applications. 2009 Apr 25; 329–332.
    10. Li Y, Fang J, Liu C, Liu M, Wu S. Study on the application of Dalvik injection technique for the detection of malicious programs in Android. In 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication. 2015 May 14; 309–312.
    11. Huda S, Abawajy J, Alazab M, Abdollalihian M, Islam R, Yearwood J. Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener Comput Syst. 2016 Feb 1; 55: 376–90.
    12. Bailin X, Shunzheng Y, Tao W. Application layer anomaly detection based on hsmm. In 2010 International Forum on Information Technology and Applications. 2010 Jul 16; 2: 411–414.
    13. Gao Y, Ma Y, Li D. Anomaly detection of malicious users’ behaviors for web applications based on web logs. In 2017 IEEE 17th International Conference on Communication Technology (ICCT). 2017 Oct 27; 1352–1355.
    14. Matsuda W, Fujimoto M, Mitsunaga T. Real-time detection system against malicious tools by monitoring DLL on client computers. In 2019 IEEE Conference on Application, Information and Network Security (AINS). 2019 Nov 19; 36–41.
    15. Bhat P, Dutta K, Singh S. Mapldroid: Malicious android application detection based on naive bayes using multiple. In 2019 IEEE 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). 2019 Sep 28; 49–54.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 7, 2023
    Accepted July 3, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; }n .flx {display: flex;margin: 2px;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 75%; background-color:white; padding:4px 20px 4px 20px; margin:0 10px 0 0; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.w25p {width: 25%; background-color:white; padding: 4px 10px 4px 10px; margin: 0 0 0 10px; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]