Back to Search Start Over

Windows operating system malware detection using machine learning.

Authors :
Hilabi, Rawabi
Abu-Khadrah, Ahmed
Source :
Bulletin of Electrical Engineering & Informatics; Oct2024, Vol. 13 Issue 5, p3401-3410, 10p
Publication Year :
2024

Abstract

Over the years, cybercriminals have become more sophisticated in manipulating network users. Malware is a popular tool they use to exploit victims, targeting valuable assets such as identities and credit cards in the realm of digital technology. Cybersecurity professionals are consistently innovating to detect malicious activities. Machine learning (ML) algorithms are now a leading method for rapidly identifying unseen malware, offering efficiency and intelligence beyond traditional approaches. In fact, attackers like to see the victims suffer from damage caused by malware. Malware can destroy devices and networks. Additionally, hackers can blackmail individuals and organizations to obtain money through ransomware. Therefore, the aim of this research is developing a new model that has the capability of detecting malwares that are targeting Windows operating systems (OS) through enhancing an existing model by deploying several ML algorithms which are extreme gradient boosting (XGB) and random forest (RF). In addition, the swarm optimization and ML applied to portable executable (SOMLAP) dataset applied in the portable executable (PE) is used for training data and testing these learning algorithms. The result achieved by XGB and RF hybrid technique accuracy was 0.966, precision 0.990 and recall was 0.918. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20893191
Volume :
13
Issue :
5
Database :
Complementary Index
Journal :
Bulletin of Electrical Engineering & Informatics
Publication Type :
Academic Journal
Accession number :
180146337
Full Text :
https://doi.org/10.11591/eei.v13i5.8018