Cargando…
ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques
For the enormous growth and the hysterical impact of undocumented malicious software, otherwise known as Zero-Day malware, specialized practices were joined to implement systems capable of detecting these kinds of software to avert possible disastrous consequences. Owing to the nature of developed Z...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9110140/ https://www.ncbi.nlm.nih.gov/pubmed/35586085 http://dx.doi.org/10.1155/2022/1615528 |
_version_ | 1784709034176151552 |
---|---|
author | Alhaidari, Fahd Shaib, Nouran Abu Alsafi, Maram Alharbi, Haneen Alawami, Majd Aljindan, Reem Rahman, Atta-ur Zagrouba, Rachid |
author_facet | Alhaidari, Fahd Shaib, Nouran Abu Alsafi, Maram Alharbi, Haneen Alawami, Majd Aljindan, Reem Rahman, Atta-ur Zagrouba, Rachid |
author_sort | Alhaidari, Fahd |
collection | PubMed |
description | For the enormous growth and the hysterical impact of undocumented malicious software, otherwise known as Zero-Day malware, specialized practices were joined to implement systems capable of detecting these kinds of software to avert possible disastrous consequences. Owing to the nature of developed Zero-Day malware, distinct evasion tactics are used to remain stealth. Hence, there is a need for advance investigations of the methods that can identify such kind of malware. Machine learning (ML) is among the promising techniques for such type of predictions, while the sandbox provides a safe environment for such experiments. After thorough literature review, carefully chosen ML techniques are proposed for the malware detection, under Cuckoo sandboxing (CS) environment. The proposed system is coined as Zero-Day Vigilante (ZeVigilante) to detect the malware considering both static and dynamic analyses. We used adequate datasets for both analyses incorporating sufficient samples in contrast to other studies. Consequently, the processed datasets are used to train and test several ML classifiers including Random Forest (RF), Neural Networks (NN), Decision Tree (DT), k-Nearest Neighbor (kNN), Naïve Bayes (NB), and Support Vector Machine (SVM). It is observed that RF achieved the best accuracy for both static and dynamic analyses, 98.21% and 98.92%, respectively. |
format | Online Article Text |
id | pubmed-9110140 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-91101402022-05-17 ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques Alhaidari, Fahd Shaib, Nouran Abu Alsafi, Maram Alharbi, Haneen Alawami, Majd Aljindan, Reem Rahman, Atta-ur Zagrouba, Rachid Comput Intell Neurosci Research Article For the enormous growth and the hysterical impact of undocumented malicious software, otherwise known as Zero-Day malware, specialized practices were joined to implement systems capable of detecting these kinds of software to avert possible disastrous consequences. Owing to the nature of developed Zero-Day malware, distinct evasion tactics are used to remain stealth. Hence, there is a need for advance investigations of the methods that can identify such kind of malware. Machine learning (ML) is among the promising techniques for such type of predictions, while the sandbox provides a safe environment for such experiments. After thorough literature review, carefully chosen ML techniques are proposed for the malware detection, under Cuckoo sandboxing (CS) environment. The proposed system is coined as Zero-Day Vigilante (ZeVigilante) to detect the malware considering both static and dynamic analyses. We used adequate datasets for both analyses incorporating sufficient samples in contrast to other studies. Consequently, the processed datasets are used to train and test several ML classifiers including Random Forest (RF), Neural Networks (NN), Decision Tree (DT), k-Nearest Neighbor (kNN), Naïve Bayes (NB), and Support Vector Machine (SVM). It is observed that RF achieved the best accuracy for both static and dynamic analyses, 98.21% and 98.92%, respectively. Hindawi 2022-05-09 /pmc/articles/PMC9110140/ /pubmed/35586085 http://dx.doi.org/10.1155/2022/1615528 Text en Copyright © 2022 Fahd Alhaidari et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Alhaidari, Fahd Shaib, Nouran Abu Alsafi, Maram Alharbi, Haneen Alawami, Majd Aljindan, Reem Rahman, Atta-ur Zagrouba, Rachid ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
title | ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
title_full | ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
title_fullStr | ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
title_full_unstemmed | ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
title_short | ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques |
title_sort | zevigilante: detecting zero-day malware using machine learning and sandboxing analysis techniques |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9110140/ https://www.ncbi.nlm.nih.gov/pubmed/35586085 http://dx.doi.org/10.1155/2022/1615528 |
work_keys_str_mv | AT alhaidarifahd zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT shaibnouranabu zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT alsafimaram zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT alharbihaneen zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT alawamimajd zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT aljindanreem zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT rahmanattaur zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques AT zagroubarachid zevigilantedetectingzerodaymalwareusingmachinelearningandsandboxinganalysistechniques |