Malicious Application Detection in Windows Using SVM Algorithm

Year : 2023 | Volume :01 | Issue : 01 | Page : 30-36
By

Manish Kapoor

R.M. Samant

Suraj Sawant

Aishwarya Joshi

Neha Tawade

  1. Student Department of Information Technology, NBN Sinhgad School of Engineering, Pune Maharashtra India
  2. HOD Department of Information Technology, NBN Sinhgad School of Engineering, Pune Maharashtra India
  3. Student Department of Information Technology, NBN Sinhgad School of Engineering, Pune Maharashtra India
  4. Student Department of Information Technology, NBN Sinhgad School of Engineering, Pune Maharashtra India
  5. Student Department of Information Technology, NBN Sinhgad School of Engineering, Pune Maharashtra India

Abstract

In recent years, both the development of Windows application clients and the uses of smart mobile phones have increased significantly. As the number of Windows application users continues to grow, there is a rise in malicious individuals who develop harmful Windows applications with the intent of unlawfully obtaining confidential information and engaging in fraudulent activities. These applications are designed to target vulnerable areas such as mobile banking and digital wallets, aiming to deceive users and misuse their sensitive data. There are so many malicious software, tools, and programmers that are available. However, it is essential to establish a system that is capable and effective for identifying and thwarting freshly developed dangerous programmes written by hackers or programmers. This system should be able to recognise and react to sophisticated threats in an efficient manner. The purpose of this study is to identify fraudulent Windows apps using machine learning techniques.

Keywords: Malicious Application Detection in Windows Using SVM Algorithm

[This article belongs to International Journal of Mobile Computing Technology(ijmct)]

How to cite this article: Manish Kapoor, R.M. Samant, Suraj Sawant, Aishwarya Joshi, Neha Tawade. Malicious Application Detection in Windows Using SVM Algorithm. International Journal of Mobile Computing Technology. 2023; 01(01):30-36.
How to cite this URL: Manish Kapoor, R.M. Samant, Suraj Sawant, Aishwarya Joshi, Neha Tawade. Malicious Application Detection in Windows Using SVM Algorithm. International Journal of Mobile Computing Technology. 2023; 01(01):30-36. Available from: https://journals.stmjournals.com/ijmct/article=2023/view=114732


Browse Figures

References

  1. Karbab EB, Debbabi M, Derhab A, Mouheb D. MalDozer: Automatic framework for android malware detection using deep learning. Digit Investig. 2018 Mar 1; 24: S48–59.
  2. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 IEEE 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
  3. Canfora G, Medvet E, Mercaldo F, Visaggio CA. Detecting android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile. 2015 Aug 31; 13–20.
  4. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN. Taintdroid: an information-flow tracking system for real time privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS). 2014 Jun 1; 32(2): 1–29.
  5. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
  6. Ni Z, Yang M, Ling Z, Wu JN, Luo J. Real-time detection of malicious behavior in android apps. In 2016 IEEE International Conference on Advanced Cloud and Big Data (CBD). 2016 Aug 13; 221–227.
  7. Feldman S, Stadther D, Wang B. Manilyzer: automated android malware detection through manifest analysis. In 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems. 2014 Oct 28; 767–772.
  8. Tian P, Huang X. A malicious application detection model to remove the influence of interference API sequence. In 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017 Nov 24; 501–505.
  9. Chen F, Fu Y. Dynamic detection of unknown malicious executables base on API interception. In 2009 IEEE 1st International Workshop on Database Technology and Applications. 2009 Apr 25; 329–332.
  10. Li Y, Fang J, Liu C, Liu M, Wu S. Study on the application of Dalvik injection technique for the detection of malicious programs in Android. In 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication. 2015 May 14; 309–312.
  11. Huda S, Abawajy J, Alazab M, Abdollalihian M, Islam R, Yearwood J. Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener Comput Syst. 2016 Feb 1; 55: 376–90.
  12. Bailin X, Shunzheng Y, Tao W. Application layer anomaly detection based on hsmm. In 2010 International Forum on Information Technology and Applications. 2010 Jul 16; 2: 411–414.
  13. Gao Y, Ma Y, Li D. Anomaly detection of malicious users’ behaviors for web applications based on web logs. In 2017 IEEE 17th International Conference on Communication Technology (ICCT). 2017 Oct 27; 1352–1355.
  14. Matsuda W, Fujimoto M, Mitsunaga T. Real-time detection system against malicious tools by monitoring DLL on client computers. In 2019 IEEE Conference on Application, Information and Network Security (AINS). 2019 Nov 19; 36–41.
  15. Bhat P, Dutta K, Singh S. Mapldroid: Malicious android application detection based on naive bayes using multiple. In 2019 IEEE 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). 2019 Sep 28; 49–54.

Regular Issue Subscription Review Article
Volume 01
Issue 01
Received June 7, 2023
Accepted July 3, 2023
Published August 3, 2023